loadpatents
name:-0.037631034851074
name:-0.016788959503174
name:-0.016332149505615
Molloy; Ian Michael Patent Filings

Molloy; Ian Michael

Patent Applications and Registrations

Patent applications and USPTO patent grants for Molloy; Ian Michael.The latest application filed is for "spatiotemporal deep learning for behavioral biometrics".

Company Profile
13.13.31
  • Molloy; Ian Michael - Westchester NY
  • Molloy; Ian Michael - Chappaqua NY
  • Molloy; Ian Michael - Ridgefield CT
  • Molloy; Ian Michael - White Plains NY US
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Device discovery and classification from encrypted network traffic
Grant 11,455,569 - Valdez , et al. September 27, 2
2022-09-27
Spatiotemporal Deep Learning for Behavioral Biometrics
App 20220188390 - Lee; Taesung ;   et al.
2022-06-16
Constraining neural networks for robustness through alternative encoding
App 20220180157 - Eykholt; Kevin ;   et al.
2022-06-09
Dynamic Gradient Deception Against Adversarial Examples in Machine Learning Models
App 20220180242 - Lee; Taesung ;   et al.
2022-06-09
Adaptive robustness certification against adversarial examples
App 20220180172 - Eykholt; Kevin ;   et al.
2022-06-09
Detecting adversary attacks on a deep neural network (DNN)
App 20220156563 - Zhang; Jialong ;   et al.
2022-05-19
Automatic Generation Of Training Data For Anomaly Detection Using Other User's Data Samples
App 20220121995 - Chari; Suresh N. ;   et al.
2022-04-21
Adversarial Interpolation Backdoor Detection
App 20220114259 - Ludwig; Heiko H. ;   et al.
2022-04-14
Neural Network Robustness through Obfuscation
App 20220100847 - Wegman; Mark ;   et al.
2022-03-31
Reducing attack surface by selectively collocating applications on host computers
Grant 11,277,434 - Le , et al. March 15, 2
2022-03-15
Determining When to Perform and Performing Runtime Binary Slimming
App 20220066757 - Le; Michael Vu ;   et al.
2022-03-03
Application binary rewriting to reduce binary attack surface area
Grant 11,262,993 - Le , et al. March 1, 2
2022-03-01
Automatic generation of training data for anomaly detection using other user's data samples
Grant 11,227,232 - Chari , et al. January 18, 2
2022-01-18
Analytics Engine for Data Exploration and Analytics
App 20220014531 - Vajipayajula; Sulakshan ;   et al.
2022-01-13
Determining when to perform and performing runtime binary slimming
Grant 11,221,835 - Le , et al. January 11, 2
2022-01-11
Detecting poisoning attacks on neural networks by activation clustering
Grant 11,188,789 - Chen , et al. November 30, 2
2021-11-30
Two-level sequence learning for analyzing, metering, generating, and cracking passwords
Grant 11,171,946 - Chari , et al. November 9, 2
2021-11-09
Using multimodal model consistency to detect adversarial attacks
App 20210319093 - Molloy; Ian Michael ;   et al.
2021-10-14
Reducing Attack Surface By Selectively Collocating Applications On Host Computers
App 20210306367 - Le; Michael Vu ;   et al.
2021-09-30
Measuring Overfitting of Machine Learning Computer Model and Susceptibility to Security Threats
App 20210303695 - Grosse; Kathrin ;   et al.
2021-09-30
Training Diverse and Robust Ensembles of Artificial Intelligence Computer Models
App 20210287141 - Molloy; Ian Michael ;   et al.
2021-09-16
Determining When to Perform and Performing Runtime Binary Slimming
App 20210247971 - Le; Michael Vu ;   et al.
2021-08-12
Protecting information embedded in a machine learning model
App 20210150042 - Zhang; Jialong ;   et al.
2021-05-20
Policy-based detection of anomalous control and data flow paths in an application program
App 20210133324 - Chari; Suresh ;   et al.
2021-05-06
Policy-based detection of anomalous control and data flow paths in an application program
Grant 10,902,121 - Chari , et al. January 26, 2
2021-01-26
Device Discovery And Classification From Encrypted Network Traffic
App 20200219005 - Valdez; Enriquillo ;   et al.
2020-07-09
Two-Level Sequence Learning for Analyzing, Metering, Generating, and Cracking Passwords
App 20200186516 - Chari; Suresh ;   et al.
2020-06-11
Two-level sequence learning for analyzing, metering, generating, and cracking passwords
Grant 10,609,017 - Chari , et al.
2020-03-31
System for Measuring Information Leakage of Deep Learning Models
App 20200082259 - GU; Zhongshu ;   et al.
2020-03-12
Detecting Poisoning Attacks On Neural Networks By Activation Clustering
App 20200050945 - Chen; Bryant ;   et al.
2020-02-13
Application binary rewriting to reduce binary attack surface area
Grant 10,545,745 - Le , et al. Ja
2020-01-28
Application Binary Rewriting to Reduce Binary Attack Surface Area
App 20200019392 - Le; Michael Vu ;   et al.
2020-01-16
Application Binary Rewriting to Reduce Binary Attack Surface Area
App 20190324732 - Le; Michael Vu ;   et al.
2019-10-24
Policy-based detection of anomalous control and data flow paths in an application program
App 20190121979 - Chari; Suresh ;   et al.
2019-04-25
Automatic Generation Of Training Data For Anomaly Detection Using Other User's Data Samples
App 20190034836 - Chari; Suresh N. ;   et al.
2019-01-31
Automatic generation of training data for anomaly detection using other user's data samples
Grant 10,147,049 - Chari , et al. De
2018-12-04
Two-Level Sequence Learning for Analyzing, Metering, Generating, and Cracking Passwords
App 20180332023 - Chari; Suresh ;   et al.
2018-11-15
Data-centric Monitoring Of Compliance Of Distributed Applications
App 20170193239 - CHARI; Suresh N. ;   et al.
2017-07-06
Automatic Generation Of Training Data For Anomaly Detection Using Other User's Data Samples
App 20170061322 - CHARI; Suresh N. ;   et al.
2017-03-02
Role mining with user attribution using generative models
Grant 8,983,877 - Chari , et al. March 17, 2
2015-03-17
Techniques for Generating Balanced and Class-Independent Training Data From Unlabeled Data Set
App 20130097103 - Chari; Suresh N. ;   et al.
2013-04-18
Role Mining With User Attribution Using Generative Models
App 20120246098 - Chari; Suresh N. ;   et al.
2012-09-27

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed