loadpatents
name:-0.043387174606323
name:-0.03422999382019
name:-0.033200979232788
Jang; Jiyong Patent Filings

Jang; Jiyong

Patent Applications and Registrations

Patent applications and USPTO patent grants for Jang; Jiyong.The latest application filed is for "constraining neural networks for robustness through alternative encoding".

Company Profile
35.30.43
  • Jang; Jiyong - Ossining NY
  • Jang; Jiyong - Chappaqua NY
  • Jang; Jiyong - White Plains NY
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Method and system for rateless and pollution-attack-resilient network coding
Grant 11,362,810 - Hu , et al. June 14, 2
2022-06-14
Constraining neural networks for robustness through alternative encoding
App 20220180157 - Eykholt; Kevin ;   et al.
2022-06-09
Adaptive robustness certification against adversarial examples
App 20220180172 - Eykholt; Kevin ;   et al.
2022-06-09
Detecting adversary attacks on a deep neural network (DNN)
App 20220156563 - Zhang; Jialong ;   et al.
2022-05-19
Detecting and mitigating malware by evaluating HTTP errors
App 20220124102 - Zhang; Jialong ;   et al.
2022-04-21
Intrusion Detection In Micro-services Through Container Telemetry And Behavior Modeling
App 20220121741 - Araujo; Frederico ;   et al.
2022-04-21
Methods and systems for improving beaconing detection algorithms
Grant 11,153,337 - Hu , et al. October 19, 2
2021-10-19
Deactivating evasive malware
Grant 11,144,642 - Gu , et al. October 12, 2
2021-10-12
Software Intelligence As-a-service
App 20210279303 - JANG; Jiyong ;   et al.
2021-09-09
Cognitive analysis of security data with signal flow-based graph exploration
Grant 11,089,040 - Jang , et al. August 10, 2
2021-08-10
Inferring temporal relationships for cybersecurity events
Grant 11,082,434 - Ravindra , et al. August 3, 2
2021-08-03
Automated semantic modeling of system events
App 20210182387 - Zhu; Ziyun ;   et al.
2021-06-17
Characterizing user behavior in a computer system by automated learning of intention embedded in a system-generated event graph
App 20210176260 - Pan; Xiaorui ;   et al.
2021-06-10
AI-powered cyber data concealment and targeted mission execution
Grant 11,032,251 - Kirat , et al. June 8, 2
2021-06-08
Automatic categorization of IDPS signatures from multiple different IDPS systems
Grant 11,025,656 - Hu , et al. June 1, 2
2021-06-01
Automatic Categorization Of IDPS Signatures From Multiple Different IDPS Systems
App 20210160260 - HU; Xin ;   et al.
2021-05-27
Detecting Malicious Beaconing Communities Using Lockstep Detection And Co-occurrence Graph
App 20210120012 - JANG; Jiyong ;   et al.
2021-04-22
Cognitive offense analysis using contextual data and knowledge graphs
Grant 10,958,672 - Bird , et al. March 23, 2
2021-03-23
Detecting malicious beaconing communities using lockstep detection and co-occurrence graph
Grant 10,887,323 - Jang , et al. January 5, 2
2021-01-05
Identifying command and control endpoint used by domain generation algorithm (DGA) malware
Grant 10,841,320 - Hu , et al. November 17, 2
2020-11-17
Inferring temporal relationships for cybersecurity events
App 20200322361 - Ravindra; Preeti ;   et al.
2020-10-08
Corroborating threat assertions by consolidating security and threat intelligence with kinetics data
Grant 10,686,830 - Jang , et al.
2020-06-16
Feedback-based prioritized cognitive analysis
Grant 10,681,061 - Jang , et al.
2020-06-09
Method and system for rateless and pollution-attack-resilient network coding including decoder(s)
Grant 10,652,217 - Hu , et al.
2020-05-12
Cognitive analysis of security data with signal flow-based graph exploration
App 20200145442 - Jang; Jiyong ;   et al.
2020-05-07
Cognitive offense analysis using contextual data and knowledge graphs
App 20200120115 - Bird; William Alexander ;   et al.
2020-04-16
Deactivating Evasive Malware
App 20200089879 - GU; ZHONGSHU ;   et al.
2020-03-19
Automatic Categorization Of IDPS Signatures From Multiple Different IDPS Systems
App 20200067950 - HU; Xin ;   et al.
2020-02-27
Detecting web exploit kits by tree-based structural similarity search
Grant 10,560,471 - Hu , et al. Feb
2020-02-11
Deactivating evasive malware
Grant 10,546,128 - Gu , et al. Ja
2020-01-28
Method And System For Rateless And Pollution-attack-resilient Network Coding
App 20200028669 - HU; Xin ;   et al.
2020-01-23
Method For Efficient And Practical Key Distribution In Network Coding Systems
App 20200028670 - HU; Xin ;   et al.
2020-01-23
Cognitive offense analysis using contextual data and knowledge graphs
Grant 10,542,015 - Bird , et al. Ja
2020-01-21
Automatic categorization of IDPS signatures from multiple different IDPS systems
Grant 10,542,014 - Hu , et al. Ja
2020-01-21
Cognitive analysis of security data with signal flow-based graph exploration
Grant 10,536,472 - Jang , et al. Ja
2020-01-14
AI-powered Cyber Data Concealment and Targeted Mission Execution
App 20200007512 - Kirat; Dhilung Hang ;   et al.
2020-01-02
Method and system for rateless and pollution-attack-resilient network coding
Grant 10,505,719 - Hu , et al. Dec
2019-12-10
Identifying command and control endpoint used by domain generation algorithm (DGA) malware
App 20190364059 - Hu; Xin ;   et al.
2019-11-28
Method for efficient and practical key distribution in network coding systems
Grant 10,484,171 - Hu , et al. Nov
2019-11-19
Methods And Systems For Improving Beaconing Detection Algorithms
App 20190230109 - Hu; Xin ;   et al.
2019-07-25
Identifying command and control endpoint used by domain generation algorithm (DGA) malware
Grant 10,362,044 - Hu , et al.
2019-07-23
Corroborating threat assertions by consolidating security and threat intelligence with kinetics data
App 20190190945 - Jang; Jiyong ;   et al.
2019-06-20
Cognitive offense analysis using enriched graphs
Grant 10,313,365 - Jang , et al.
2019-06-04
Methods and systems for improving beaconing detection algorithms
Grant 10,284,584 - Hu , et al.
2019-05-07
Deactivating Evasive Malware
App 20190108339 - GU; ZHONGSHU ;   et al.
2019-04-11
USB device firmware sanitization
Grant 10,216,673 - Beitler , et al. Feb
2019-02-26
Identifying command and control endpoint used by domain generation algorithm (DGA) malware
App 20190052650 - Hu; Xin ;   et al.
2019-02-14
Detecting Malicious Beaconing Communities Using Lockstep Detection And Co-occurrence Graph
App 20180367547 - JANG; Jiyong ;   et al.
2018-12-20
Feedback-based prioritized cognitive analysis
App 20180367549 - Jang; Jiyong ;   et al.
2018-12-20
Protecting Computer Systems From Malicious Usb Devices Via A Usb Firewall
App 20180270194 - BEITLER; Anton ;   et al.
2018-09-20
Detection of beaconing behavior in network traffic
Grant 10,044,737 - Hu , et al. August 7, 2
2018-08-07
USB Device Firmware Sanitization
App 20180203819 - Beitler; Anton ;   et al.
2018-07-19
Consolidating structured and unstructured security and threat intelligence with knowledge graphs
App 20180159876 - Park; Youngja ;   et al.
2018-06-07
Cognitive offense analysis using enriched graphs
App 20180048662 - Jang; Jiyong ;   et al.
2018-02-15
Cognitive offense analysis using contextual data and knowledge graphs
App 20180048661 - Bird; William Alexander ;   et al.
2018-02-15
Cognitive analysis of security data with signal flow-based graph exploration
App 20180046928 - Jang; Jiyong ;   et al.
2018-02-15
Method For Efficient And Practical Key Distribution In Network Coding Systems
App 20170366341 - HU; Xin ;   et al.
2017-12-21
Automatic Categorization of IDPS Signatures from multiple different idps systems
App 20170331841 - HU; Xin ;   et al.
2017-11-16
Method And System For Rateless And Pollution-attack-resilient Network Coding Including Decoder(s)
App 20170317986 - HU; Xin ;   et al.
2017-11-02
Method And System For Rateless And Pollution-attack-resilient Network Coding
App 20170317819 - HU; Xin ;   et al.
2017-11-02
Methods And Systems For Improving Beaconing Detection Algorithms
App 20170244731 - HU; Xin ;   et al.
2017-08-24
Detecting web exploit kits by tree-based structural similarity search
Grant 9,723,016 - Hu , et al. August 1, 2
2017-08-01
Detection of beaconing behavior in network traffic
Grant 9,591,007 - Hu , et al. March 7, 2
2017-03-07
Detecting Web Exploit Kits By Tree-based Structural Similarity Search
App 20170054749 - Hu; Xin ;   et al.
2017-02-23
Identifying malicious web infrastructures
Grant 9,578,042 - Hu , et al. February 21, 2
2017-02-21
Identifying malicious web infrastructures
Grant 9,571,518 - Hu , et al. February 14, 2
2017-02-14
Detecting web exploit kits by tree-based structural similarity search
Grant 9,516,051 - Hu , et al. December 6, 2
2016-12-06
Detecting Web Exploit Kits By Tree-based Structural Similarity Search
App 20160337388 - HU; Xin ;   et al.
2016-11-17
Detecting Web Exploit Kits By Tree-based Structural Similarity Search
App 20160337387 - Hu; Xin ;   et al.
2016-11-17
Identifying Malicious Web Infrastructures
App 20160261626 - Hu; Xin ;   et al.
2016-09-08
Identifying Malicious Web Infrastructures
App 20160261608 - Hu; Xin ;   et al.
2016-09-08
Detection Of Beaconing Behavior In Network Traffic
App 20160134641 - HU; Xin ;   et al.
2016-05-12
Detection Of Beaconing Behavior In Network Traffic
App 20160134651 - HU; Xin ;   et al.
2016-05-12

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed