| 12353595 |
Secure and private hyper-personalization system and method |
Debasish Mukhopadhyay, Chen Liang |
2025-07-08 |
| 11960907 |
Configuring an electronic device using artificial intelligence |
Chen Liang, Shayak Lahiri, Adrian Francisco Teran Guajardo |
2024-04-16 |
| 11568081 |
Secure and private hyper-personalization system and method |
Debasish Mukhopadhyay, Chen Liang |
2023-01-31 |
| 11494200 |
Configuring an electronic device using artificial intelligence |
Chen Liang, Shayak Lahiri, Adrian Francisco Teran Guajardo |
2022-11-08 |
| 10839069 |
Protecting artificial intelligence models using virtual secure mode |
Wenbo Shen, Chen Liang, Adrian Francisco Teran Guajardo |
2020-11-17 |
| 10810056 |
Adding descriptive metadata to application programming interfaces for consumption by an intelligent agent |
— |
2020-10-20 |
| 10747520 |
Resource deployment using device analytics |
Marc Shepard, Marc-Andrea Klimaschewski, Chen Liang, Ramasubramanian Shastri, Hung M. Dang +1 more |
2020-08-18 |
| 9660817 |
Advising clients about certificate authority trust |
Anooshiravan Saboori, Muhammad Umar Janjua, Nelly Porter, Philip J. Hallin, Haitao Li +4 more |
2017-05-23 |
| 9626277 |
Anomaly analysis for software distribution |
Aarthi Thangamani, Chris J. Day, Divyesh Kumar Shah, Nimish Aggarwal |
2017-04-18 |
| 8966659 |
Automatic fraudulent digital certificate detection |
Muhammad Umar Janjua, Yogesh A. Mehta, Maarten Van Horenbeeck, Anooshiravan Saboori, Nelly Porter +1 more |
2015-02-24 |