loadpatents
Patent applications and USPTO patent grants for Xie; Yinglian.The latest application filed is for "online user behavior analysis service backed by deep learning models trained on shared digital information".
Patent | Date |
---|---|
Automated rule recommendation engine Grant 11,232,364 - Lu , et al. January 25, 2 | 2022-01-25 |
Using IP address data to detect malicious activities Grant 10,771,497 - Xie , et al. Sep | 2020-09-08 |
Online User Behavior Analysis Service Backed By Deep Learning Models Trained On Shared Digital Information App 20200045066 - Meng; Cong A. ;   et al. | 2020-02-06 |
Detecting Network Attacks App 20190207960 - Chu; Kuanyu ;   et al. | 2019-07-04 |
Using hypergraphs to determine suspicious user activities Grant 10,135,788 - Xie , et al. November 20, 2 | 2018-11-20 |
Using IP address data to detect malicious activities Grant 10,129,288 - Xie , et al. November 13, 2 | 2018-11-13 |
Using group analysis to determine suspicious accounts or activities Grant 10,110,616 - Xie , et al. October 23, 2 | 2018-10-23 |
Determining cause of energy spike using energy reports Grant 10,098,069 - Chandra , et al. October 9, 2 | 2018-10-09 |
Automated Rule Recommendation Engine App 20180285745 - Lu; Catherine ;   et al. | 2018-10-04 |
Graph based framework for detecting malicious or compromised accounts Grant 10,009,358 - Xie , et al. June 26, 2 | 2018-06-26 |
Using hypergraphs to determine suspicious user activities Grant 9,787,640 - Xie , et al. October 10, 2 | 2017-10-10 |
User Interface for Displaying and Comparing Attack Telemetry Resources App 20170279845 - Chu; Yang-hua ;   et al. | 2017-09-28 |
User Interface For Displaying Network Analytics App 20170272453 - Murray; Patrick Glenn ;   et al. | 2017-09-21 |
Optimizing data partitioning for data-parallel computing Grant 9,235,396 - Ke , et al. January 12, 2 | 2016-01-12 |
Determining populated IP addresses Grant 9,148,434 - Yu , et al. September 29, 2 | 2015-09-29 |
Determining Cause Of Energy Spike Using Energy Reports App 20150223172 - Chandra; Ranveer ;   et al. | 2015-08-06 |
Automatic detection of search results poisoning attacks Grant 8,997,220 - Yu , et al. March 31, 2 | 2015-03-31 |
Automatically identifying dynamic internet protocol addresses Grant 8,856,360 - Achan , et al. October 7, 2 | 2014-10-07 |
Mining user behavior data for IP address space intelligence Grant 8,789,171 - Osipkov , et al. July 22, 2 | 2014-07-22 |
Vouching for user account using social networking relationship Grant 8,745,738 - Xie , et al. June 3, 2 | 2014-06-03 |
Clustering botnet behavior using parameterized models Grant 8,745,731 - Achan , et al. June 3, 2 | 2014-06-03 |
Enhanced security and performance of web applications Grant 8,677,141 - Erlingsson , et al. March 18, 2 | 2014-03-18 |
Automatic identification of travel and non-travel network addresses Grant 8,615,605 - Yu , et al. December 24, 2 | 2013-12-24 |
Determining Legitimate And Malicious Advertisements Using Advertising Delivery Sequences App 20130339158 - Xie; Yinglian ;   et al. | 2013-12-19 |
Identifying malicious queries Grant 8,495,742 - Abadi , et al. July 23, 2 | 2013-07-23 |
Vouching For User Account Using Social Networking Relationship App 20130185791 - Xie; Yinglian ;   et al. | 2013-07-18 |
Optimizing Data Partitioning For Data-parallel Computing App 20130152057 - Ke; Qifa ;   et al. | 2013-06-13 |
Using social graphs to combat malicious attacks Grant 8,434,150 - Xie , et al. April 30, 2 | 2013-04-30 |
Blocking malicious activity using blacklist Grant 8,387,145 - Xie , et al. February 26, 2 | 2013-02-26 |
Automatic Detection Of Search Results Poisoning Attacks App 20120304287 - Yu; Fang ;   et al. | 2012-11-29 |
Using Social Graphs To Combat Malicious Attacks App 20120246720 - Xie; Yinglian ;   et al. | 2012-09-27 |
Host accountability using unreliable identifiers Grant 8,185,613 - Xie , et al. May 22, 2 | 2012-05-22 |
Automatic Identification Of Travel And Non-travel Network Addresses App 20120102169 - Yu; Fang ;   et al. | 2012-04-26 |
Fingerprinting event logs for system management troubleshooting Grant 8,069,374 - Panigrahy , et al. November 29, 2 | 2011-11-29 |
Graph based bot-user detection Grant 8,069,210 - Gillum , et al. November 29, 2 | 2011-11-29 |
Identifying Malicious Queries App 20110283360 - Abadi; Martin ;   et al. | 2011-11-17 |
Large Scale Search Bot Detection App 20110208714 - Soukal; David ;   et al. | 2011-08-25 |
Host Accountability Using Unreliable Identifiers App 20100312877 - Xie; Yinglian ;   et al. | 2010-12-09 |
Blocking Malicious Activity Using Blacklist App 20100313264 - Xie; Yinglian ;   et al. | 2010-12-09 |
Fingerprinting Event Logs For System Management Troubleshooting App 20100223499 - Panigrahy; Rina ;   et al. | 2010-09-02 |
Graph Based Bot-user Detection App 20100095374 - Gillum; Eliot C. ;   et al. | 2010-04-15 |
Automatic Botnet Spam Signature Generation App 20090265786 - Xie; Yinglian ;   et al. | 2009-10-22 |
Clustering Botnet Behavior Using Parameterized Models App 20090254989 - Achan; Kannan ;   et al. | 2009-10-08 |
Mining User Behavior Data For Ip Address Space Intelligence App 20090249480 - Osipkov; Ivan ;   et al. | 2009-10-01 |
Enhanced Security And Performance Of Web Applications App 20090138937 - Erlingsson; Ulfar ;   et al. | 2009-05-28 |
Automatically identifying dynamic Internet protocol addresses App 20080320119 - Achan; Kannan ;   et al. | 2008-12-25 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.