Patent | Date |
---|
Privacy enhancing deep learning cloud service using a trusted execution environment Grant 11,443,182 - Gu , et al. September 13, 2 | 2022-09-13 |
Deep neural network hardening framework Grant 11,443,178 - Edwards , et al. September 13, 2 | 2022-09-13 |
Privacy Enhancing Deep Learning Cloud Service Using a Trusted Execution Environment App 20220269942 - Gu; Zhongshu ;   et al. | 2022-08-25 |
Self-learning peer group analysis for optimizing identity and access management environments Grant 11,416,771 - Patil , et al. August 16, 2 | 2022-08-16 |
Recurrent Neural Network Based Anomaly Detection App 20220207137 - Huang; Heqing ;   et al. | 2022-06-30 |
Automatic audit logging of events in software applications performing regulatory workloads Grant 11,372,997 - Chari , et al. June 28, 2 | 2022-06-28 |
Recurrent neural network based anomaly detection Grant 11,301,563 - Huang , et al. April 12, 2 | 2022-04-12 |
Protecting Cognitive Systems from Model Stealing Attacks App 20210303703 - Lee; Taesung ;   et al. | 2021-09-30 |
Using gradients to detect backdoors in neural networks Grant 11,132,444 - Carvalho , et al. September 28, 2 | 2021-09-28 |
Protecting cognitive systems from model stealing attacks Grant 11,023,593 - Lee , et al. June 1, 2 | 2021-06-01 |
Self-Learning Peer Group Analysis for Optimizing Identity and Access Management Environments App 20210142209 - Patil; Priti P. ;   et al. | 2021-05-13 |
Detecting malicious user activity Grant 10,891,371 - Chari , et al. January 12, 2 | 2021-01-12 |
Jointly discovering user roles and data clusters using both access and side information Grant 10,805,308 - Park , et al. October 13, 2 | 2020-10-13 |
Recurrent Neural Network Based Anomaly Detection App 20200293653 - Huang; Heqing ;   et al. | 2020-09-17 |
Automatic Audit Logging of Events in Software Applications Performing Regulatory Workloads App 20200210609 - Chari; Suresh N. ;   et al. | 2020-07-02 |
Protecting cognitive systems from gradient based attacks through the use of deceiving gradients Grant 10,657,259 - Lee , et al. | 2020-05-19 |
Automatic audit logging of events in software applications performing regulatory workloads Grant 10,628,600 - Chari , et al. | 2020-04-21 |
Detecting malicious user activity Grant 10,599,837 - Chari , et al. | 2020-03-24 |
Verifiable Deep Learning Training Service App 20200082270 - Gu; Zhongshu ;   et al. | 2020-03-12 |
Enhancing Data Privacy in Remote Deep Learning Services App 20200082272 - Gu; Zhongshu ;   et al. | 2020-03-12 |
Detecting Malicious User Activity App 20200042699 - Chari; Suresh N. ;   et al. | 2020-02-06 |
Deep learning for targeted password generation with cognitive user information understanding Grant 10,540,490 - Chari , et al. Ja | 2020-01-21 |
Adversarial learning of privacy protection layers for image recognition services Grant 10,535,120 - Edwards , et al. Ja | 2020-01-14 |
Privacy Enhancing Deep Learning Cloud Service Using a Trusted Execution Environment App 20190392305 - Gu; Zhongshu ;   et al. | 2019-12-26 |
Automatic generation of data-centric attack graphs Grant 10,503,911 - Chari , et al. Dec | 2019-12-10 |
Data-centric monitoring of compliance of distributed applications Grant 10,482,265 - Chari , et al. Nov | 2019-11-19 |
Using Gradients to Detect Backdoors in Neural Networks App 20190318099 - Carvalho; Wilka ;   et al. | 2019-10-17 |
Preventing monoculture in application distribution Grant 10,419,224 - Chari , et al. Sept | 2019-09-17 |
Dynamic multi-factor authentication challenge generation Grant 10,375,119 - Aronowitz , et al. | 2019-08-06 |
Clustering for detection of anomalous behavior and insider threat Grant 10,341,372 - Chari , et al. | 2019-07-02 |
Jointly Discovering User Roles And Data Clusters Using Both Access And Side Information App 20190199731 - Park; Youngja ;   et al. | 2019-06-27 |
Deep Neural Network Hardening Framework App 20190188562 - Edwards; Benjamin J. ;   et al. | 2019-06-20 |
Adversarial Learning of Privacy Protection Layers for Image Recognition Services App 20190188830 - Edwards; Benjamin J. ;   et al. | 2019-06-20 |
Protecting Cognitive Systems from Gradient Based Attacks through the Use of Deceiving Gradients App 20190130110 - Lee; Taesung ;   et al. | 2019-05-02 |
Protection and verification of user authentication credentials against server compromise Grant 10,277,591 - Koved , et al. | 2019-04-30 |
Deep Learning for Targeted Password Generation with Cognitive User Information Understanding App 20190121953 - Chari; Suresh N. ;   et al. | 2019-04-25 |
Protecting Cognitive Systems from Model Stealing Attacks App 20190095629 - Lee; Taesung ;   et al. | 2019-03-28 |
Clustering for Detection of Anomalous Behavior and Insider Threat App 20180359270 - Chari; Suresh ;   et al. | 2018-12-13 |
Automatic Generation of Data-Centric Attack Graphs App 20180330103 - Chari; Suresh N. ;   et al. | 2018-11-15 |
Protection and Verification of User Authentication Credentials against Server Compromise App 20180316666 - Koved; Lawrence ;   et al. | 2018-11-01 |
Automatic generation of data-centric attack graphs Grant 10,108,803 - Chari , et al. October 23, 2 | 2018-10-23 |
Protection and verification of user authentication credentials against server compromise Grant 10,097,544 - Koved , et al. October 9, 2 | 2018-10-09 |
Automatic Audit Logging of Events in Software Applications Performing Regulatory Workloads App 20180196958 - Chari; Suresh N. ;   et al. | 2018-07-12 |
Automatic audit logging of events in software applications performing regulatory workloads Grant 10,007,801 - Chari , et al. June 26, 2 | 2018-06-26 |
Dynamic Multi-Factor Authentication Challenge Generation App 20180034859 - Aronowitz; Hagai ;   et al. | 2018-02-01 |
Discovering communities and expertise of users using semantic analysis of resource access logs Grant 9,852,208 - Chari , et al. December 26, 2 | 2017-12-26 |
Preventing Monoculture in Application Distribution App 20170359181 - CHARI; Suresh N. ;   et al. | 2017-12-14 |
Protection and Verification of User Authentication Credentials against Server Compromise App 20170353450 - Koved; Lawrence ;   et al. | 2017-12-07 |
Automatic Audit Logging of Events in Software Applications Performing Regulatory Workloads App 20170308712 - Chari; Suresh N. ;   et al. | 2017-10-26 |
Automatic Generation of Data-Centric Attack Graphs App 20170286690 - Chari; Suresh N. ;   et al. | 2017-10-05 |
Detecting Malicious User Activity App 20170286671 - Chari; Suresh N. ;   et al. | 2017-10-05 |
Inferring security policies from semantic attributes Grant 9,769,208 - Chari , et al. September 19, 2 | 2017-09-19 |
Correlating cognitive biometrics for continuous identify verification Grant 9,686,275 - Chari , et al. June 20, 2 | 2017-06-20 |
Identifying Transactional Fraud Utilizing Transaction Payment Relationship Graph Link Prediction App 20170140382 - CHARI; SURESH N. ;   et al. | 2017-05-18 |
Detecting anomalous user behavior using generative models of user actions Grant 9,558,347 - Chari , et al. January 31, 2 | 2017-01-31 |
Scoring Transactional Fraud Using Features Of Transaction Payment Relationship Graphs App 20160364794 - Chari; Suresh N. ;   et al. | 2016-12-15 |
Inferring Security Policies from Semantic Attributes App 20160352778 - Chari; Suresh N. ;   et al. | 2016-12-01 |
Techniques for reconciling permission usage with security policy for policy optimization and monitoring continuous compliance Grant 9,288,232 - Chari , et al. March 15, 2 | 2016-03-15 |
Generation of attribute based access control policy from existing authorization system Grant 9,264,451 - Chari , et al. February 16, 2 | 2016-02-16 |
Techniques for reconciling permission usage with security policy for policy optimization and monitoring continuous compliance Grant 9,246,945 - Chari , et al. January 26, 2 | 2016-01-26 |
Correlating Cognitive Biometrics For Continuous Identify Verification App 20160006730 - Chari; Suresh N. ;   et al. | 2016-01-07 |
Generating role-based access control policies based on discovered risk-averse roles Grant 9,137,263 - Chari , et al. September 15, 2 | 2015-09-15 |
Generating role-based access control policies based on discovered risk-averse roles Grant 9,137,265 - Chari , et al. September 15, 2 | 2015-09-15 |
Discovering Communities And Expertise Of Users Using Semantic Analysis Of Resource Access Logs App 20150242486 - Chari; Suresh N. ;   et al. | 2015-08-27 |
Generation Of Attribute Based Access Control Policy From Existing Authorization System App 20150082377 - Chari; Suresh N. ;   et al. | 2015-03-19 |
Detecting Anomalous User Behavior Using Generative Models of User Actions App 20150067835 - Chari; Suresh N. ;   et al. | 2015-03-05 |
Detecting Anomalous User Behavior Using Generative Models of User Actions App 20150067845 - Chari; Suresh N. ;   et al. | 2015-03-05 |
Techniques for Reconciling Permission Usage with Security Policy for Policy Optimization and Monitoring Continuous Compliance App 20140359695 - Chari; Suresh N. ;   et al. | 2014-12-04 |
Techniques for Reconciling Permission Usage with Security Policy for Policy Optimization and Monitoring Continuous Compliance App 20140359692 - Chari; Suresh N. ;   et al. | 2014-12-04 |
Generating Role-based Access Control Policies Based On Discovered Risk-averse Roles App 20140196104 - Chari; Suresh N. ;   et al. | 2014-07-10 |
Generating Role-based Access Control Policies Based On Discovered Risk-averse Roles App 20140196103 - Chari; Suresh N. ;   et al. | 2014-07-10 |