| 11539716 |
Online user behavior analysis service backed by deep learning models trained on shared digital information |
Cong Meng, Yuetong Wang, Yang Xu, Buodo Li, Ting-Fang Yen +1 more |
2022-12-27 |
| 11522873 |
Detecting network attacks |
Kuanyu Chu, Hongyu Cui, Arthur Meng, Zhong Wu, Yunfeng Xi +2 more |
2022-12-06 |
| 11232364 |
Automated rule recommendation engine |
Catherine Lu, Patrick Glenn Murray, Ming Qi, Shuo Shan, Fang Yu +1 more |
2022-01-25 |
| 10771497 |
Using IP address data to detect malicious activities |
Fang Yu |
2020-09-08 |
| 10135788 |
Using hypergraphs to determine suspicious user activities |
Fang Yu |
2018-11-20 |
| 10129288 |
Using IP address data to detect malicious activities |
Fang Yu |
2018-11-13 |
| 10110616 |
Using group analysis to determine suspicious accounts or activities |
Fang Yu |
2018-10-23 |
| 10098069 |
Determining cause of energy spike using energy reports |
Ranveer Chandra, Omid Fatemieh, Parya Moinzadeh, Chandramohan A. Thekkath |
2018-10-09 |
| 10009358 |
Graph based framework for detecting malicious or compromised accounts |
Fang Yu |
2018-06-26 |
| 9787640 |
Using hypergraphs to determine suspicious user activities |
Fang Yu |
2017-10-10 |
| 9235396 |
Optimizing data partitioning for data-parallel computing |
Qifa Ke, Vijayan Prabhakaran, Yuan Yu, Jingyue Wu, Junfeng Yang |
2016-01-12 |
| 9148434 |
Determining populated IP addresses |
Fang Yu, Chi-Yao Hong |
2015-09-29 |
| 8997220 |
Automatic detection of search results poisoning attacks |
Fang Yu, Martin Abadi, John Payyappillil John, Arvind Krishnamurthy |
2015-03-31 |
| 8856360 |
Automatically identifying dynamic internet protocol addresses |
Kannan Achan, Eliot C. Gillum, Fang Yu |
2014-10-07 |
| 8789171 |
Mining user behavior data for IP address space intelligence |
Ivan Osipkov, Geoffrey J. Hulten, John D. Mehr, Fang Yu |
2014-07-22 |
| 8745731 |
Clustering botnet behavior using parameterized models |
Kannan Achan, Fang Yu |
2014-06-03 |
| 8745738 |
Vouching for user account using social networking relationship |
Fang Yu, Qifa Ke, Martin Abadi, Eliot C. Gillum, Krishna Vitaldevara +1 more |
2014-06-03 |
| 8677141 |
Enhanced security and performance of web applications |
Ulfar Erlingsson, Ben Livshits, Cedric Fournet |
2014-03-18 |
| 8615605 |
Automatic identification of travel and non-travel network addresses |
Fang Yu, Martin Abadi, Stefan Savage, Geoffrey Michael Voelker, Andreas Pitsillidis |
2013-12-24 |
| 8495742 |
Identifying malicious queries |
Martin Abadi, Fang Yu, John Payyappillil John |
2013-07-23 |
| 8434150 |
Using social graphs to combat malicious attacks |
Fang Yu, Martin Abadi, Eliot C. Gillum, Junxian Huang, Zhuoqing Morley Mao +2 more |
2013-04-30 |
| 8387145 |
Blocking malicious activity using blacklist |
Fang Yu, Martin Abadi |
2013-02-26 |
| 8185613 |
Host accountability using unreliable identifiers |
Fang Yu, Martin Abadi |
2012-05-22 |
| 8069210 |
Graph based bot-user detection |
Eliot C. Gillum, Qifa Ke, Fang Yu, Yao Zhao |
2011-11-29 |
| 8069374 |
Fingerprinting event logs for system management troubleshooting |
Rina Panigrahy, Chad Verbowski, Junfeng Yang, Ding Yuan |
2011-11-29 |