| 12348525 |
Generating zero-trust policy for application access using machine learning |
Dianhuan Lin, Raimi Shah, Loc Bui, Subramanian Srinivasan, William Fehring +4 more |
2025-07-01 |
| 12174956 |
Pattern similarity measures to quantify uncertainty in malware classification |
Changsha Ma, Dianhuan Lin, Kevin Guo, Howie Xu |
2024-12-24 |
| 12111928 |
Utilizing machine learning to detect malicious executable files efficiently and effectively |
Changsha Ma, Nirmal Singh, Naveen Selvan, Tarun Dewan, Uday Pratap Singh +7 more |
2024-10-08 |
| 11861472 |
Machine learning model abstraction layer for runtime efficiency |
Dianhuan Lin, Changsha Ma, Douglas A. Koch, Shashank Gupta, Parnit Sainion +3 more |
2024-01-02 |
| 11803641 |
Utilizing Machine Learning to detect malicious executable files efficiently and effectively |
Changsha Ma, Nirmal Singh, Naveen Selvan, Tarun Dewan, Uday Pratap Singh +7 more |
2023-10-31 |
| 11785022 |
Building a Machine Learning model without compromising data privacy |
Changsha Ma, Dianhuan Lin, Douglas A. Koch, Dong Guo, Howie Xu |
2023-10-10 |
| 11755726 |
Utilizing machine learning for smart quarantining of potentially malicious files |
Changsha Ma, Douglas A. Koch, Dianhuan Lin, Howie Xu, Bharath Kumar +4 more |
2023-09-12 |
| 11669779 |
Prudent ensemble models in machine learning with high precision for use in network security |
Dianhuan Lin, Changsha Ma, Kevin Guo, Howie Xu |
2023-06-06 |
| 11475368 |
Machine learning model abstraction layer for runtime efficiency |
Dianhuan Lin, Changsha Ma, Douglas A. Koch, Shashank Gupta, Parnit Sainion +3 more |
2022-10-18 |
| 7253606 |
Framework that maximizes the usage of testhead resources in in-circuit test system |
Aik Koon Loh, Roy Williams, Keen Fung Wai, Chen Ni Low, Yi Jin +2 more |
2007-08-07 |