Patent | Date |
---|
Device discovery and classification from encrypted network traffic Grant 11,455,569 - Valdez , et al. September 27, 2 | 2022-09-27 |
Spatiotemporal Deep Learning for Behavioral Biometrics App 20220188390 - Lee; Taesung ;   et al. | 2022-06-16 |
Constraining neural networks for robustness through alternative encoding App 20220180157 - Eykholt; Kevin ;   et al. | 2022-06-09 |
Dynamic Gradient Deception Against Adversarial Examples in Machine Learning Models App 20220180242 - Lee; Taesung ;   et al. | 2022-06-09 |
Adaptive robustness certification against adversarial examples App 20220180172 - Eykholt; Kevin ;   et al. | 2022-06-09 |
Detecting adversary attacks on a deep neural network (DNN) App 20220156563 - Zhang; Jialong ;   et al. | 2022-05-19 |
Automatic Generation Of Training Data For Anomaly Detection Using Other User's Data Samples App 20220121995 - Chari; Suresh N. ;   et al. | 2022-04-21 |
Adversarial Interpolation Backdoor Detection App 20220114259 - Ludwig; Heiko H. ;   et al. | 2022-04-14 |
Neural Network Robustness through Obfuscation App 20220100847 - Wegman; Mark ;   et al. | 2022-03-31 |
Reducing attack surface by selectively collocating applications on host computers Grant 11,277,434 - Le , et al. March 15, 2 | 2022-03-15 |
Determining When to Perform and Performing Runtime Binary Slimming App 20220066757 - Le; Michael Vu ;   et al. | 2022-03-03 |
Application binary rewriting to reduce binary attack surface area Grant 11,262,993 - Le , et al. March 1, 2 | 2022-03-01 |
Automatic generation of training data for anomaly detection using other user's data samples Grant 11,227,232 - Chari , et al. January 18, 2 | 2022-01-18 |
Analytics Engine for Data Exploration and Analytics App 20220014531 - Vajipayajula; Sulakshan ;   et al. | 2022-01-13 |
Determining when to perform and performing runtime binary slimming Grant 11,221,835 - Le , et al. January 11, 2 | 2022-01-11 |
Detecting poisoning attacks on neural networks by activation clustering Grant 11,188,789 - Chen , et al. November 30, 2 | 2021-11-30 |
Two-level sequence learning for analyzing, metering, generating, and cracking passwords Grant 11,171,946 - Chari , et al. November 9, 2 | 2021-11-09 |
Using multimodal model consistency to detect adversarial attacks App 20210319093 - Molloy; Ian Michael ;   et al. | 2021-10-14 |
Reducing Attack Surface By Selectively Collocating Applications On Host Computers App 20210306367 - Le; Michael Vu ;   et al. | 2021-09-30 |
Measuring Overfitting of Machine Learning Computer Model and Susceptibility to Security Threats App 20210303695 - Grosse; Kathrin ;   et al. | 2021-09-30 |
Training Diverse and Robust Ensembles of Artificial Intelligence Computer Models App 20210287141 - Molloy; Ian Michael ;   et al. | 2021-09-16 |
Determining When to Perform and Performing Runtime Binary Slimming App 20210247971 - Le; Michael Vu ;   et al. | 2021-08-12 |
Protecting information embedded in a machine learning model App 20210150042 - Zhang; Jialong ;   et al. | 2021-05-20 |
Policy-based detection of anomalous control and data flow paths in an application program App 20210133324 - Chari; Suresh ;   et al. | 2021-05-06 |
Policy-based detection of anomalous control and data flow paths in an application program Grant 10,902,121 - Chari , et al. January 26, 2 | 2021-01-26 |
Device Discovery And Classification From Encrypted Network Traffic App 20200219005 - Valdez; Enriquillo ;   et al. | 2020-07-09 |
Two-Level Sequence Learning for Analyzing, Metering, Generating, and Cracking Passwords App 20200186516 - Chari; Suresh ;   et al. | 2020-06-11 |
Two-level sequence learning for analyzing, metering, generating, and cracking passwords Grant 10,609,017 - Chari , et al. | 2020-03-31 |
System for Measuring Information Leakage of Deep Learning Models App 20200082259 - GU; Zhongshu ;   et al. | 2020-03-12 |
Detecting Poisoning Attacks On Neural Networks By Activation Clustering App 20200050945 - Chen; Bryant ;   et al. | 2020-02-13 |
Application binary rewriting to reduce binary attack surface area Grant 10,545,745 - Le , et al. Ja | 2020-01-28 |
Application Binary Rewriting to Reduce Binary Attack Surface Area App 20200019392 - Le; Michael Vu ;   et al. | 2020-01-16 |
Application Binary Rewriting to Reduce Binary Attack Surface Area App 20190324732 - Le; Michael Vu ;   et al. | 2019-10-24 |
Policy-based detection of anomalous control and data flow paths in an application program App 20190121979 - Chari; Suresh ;   et al. | 2019-04-25 |
Automatic Generation Of Training Data For Anomaly Detection Using Other User's Data Samples App 20190034836 - Chari; Suresh N. ;   et al. | 2019-01-31 |
Automatic generation of training data for anomaly detection using other user's data samples Grant 10,147,049 - Chari , et al. De | 2018-12-04 |
Two-Level Sequence Learning for Analyzing, Metering, Generating, and Cracking Passwords App 20180332023 - Chari; Suresh ;   et al. | 2018-11-15 |
Data-centric Monitoring Of Compliance Of Distributed Applications App 20170193239 - CHARI; Suresh N. ;   et al. | 2017-07-06 |
Automatic Generation Of Training Data For Anomaly Detection Using Other User's Data Samples App 20170061322 - CHARI; Suresh N. ;   et al. | 2017-03-02 |
Role mining with user attribution using generative models Grant 8,983,877 - Chari , et al. March 17, 2 | 2015-03-17 |
Techniques for Generating Balanced and Class-Independent Training Data From Unlabeled Data Set App 20130097103 - Chari; Suresh N. ;   et al. | 2013-04-18 |
Role Mining With User Attribution Using Generative Models App 20120246098 - Chari; Suresh N. ;   et al. | 2012-09-27 |