Inteum Company
Links
Visible Legacy
RSS
News & Resources
Inteum Company News
Inteum Library
Subscribe
Search Results - cybersecurity
6
Results
Sort By:
Published Date
Updated Date
Title
ID
Descending
Ascending
Adversarial Text Purification: Large Language Model Approach for Defense
Background Adversarial purification is a defense mechanism for safe-guarding classifiers against adversarial attacks without knowing the type of attacks or training of the classifier. These techniques analyze and eliminate adversarial perturbations from the attacked inputs, and help to restore purified samples that retain similarity to the attacked...
Published: 6/27/2025
|
Inventor(s):
Raha Moraffah
,
Shubh Khandelwal
,
Amrita Bhattacharjee
,
Huan Liu
Keywords(s):
Artificial Intelligence
,
Defense Applications
,
Machine Learning
,
Natural Language Processing
,
Security
,
Text Mining
Category(s):
Physical Science
,
Artificial Intelligence/Machine Learning
,
Applied Technologies
,
Cybersecurity
Combating Potential Misinformation in Journalism: A Hybrid Framework using LLMs and Heuristic Approaches
Background The rapid dissemination of news is an important factor for the global population to stay up to date with current events, or to make well-informed decisions in dynamic sectors like the stock market. Journalists typically include large amounts of quantitative information using data visualization to help enhance accessibility and comprehension...
Published: 6/17/2025
|
Inventor(s):
Arlen Fan
,
Fan Lei
,
Steven Corman
,
Ross Maciejewski
Keywords(s):
Category(s):
Artificial Intelligence/Machine Learning
,
Physical Science
,
Cybersecurity
Methods and Systems for Detecting Disinformation Generated by Large Language Models
Background The rapid dissemination of news is an important factor for the global population to stay up to date with current events, or to make well-informed decisions in dynamic sectors like the stock market. Journalists typically include large amounts of quantitative information using data visualization to help enhance accessibility and comprehension...
Published: 6/17/2025
|
Inventor(s):
Bohan Jiang
,
Zhen Tan
,
Ayushi Nirmal
,
Huan Liu
Keywords(s):
Data Mining
,
Disinformation
,
Large Language Model
,
Machine Learning
Category(s):
Cybersecurity
,
Physical Science
,
Artificial Intelligence/Machine Learning
Cyber Risk Loss Modeling for Drone Delivery Systems
Background Commercial drone delivery systems are increasingly used, particularly in the US and in China, with over 2000 deliveries occurring in 2022. Drone delivery systems have many advantages over conventional delivery systems, including lower costs, faster deliveries, and increased energy efficiency. However, drone delivery systems can lead to increased...
Published: 5/20/2025
|
Inventor(s):
Stefano Chiaradonna
,
Petar Jevtic
,
Nicolas Lanchier
Keywords(s):
Category(s):
Wireless & Networking
,
Artificial Intelligence/Machine Learning
,
Applied Technologies
,
Cybersecurity
Object Flow Integrity: A Method of Securing Binary Software Against Hijacking Attacks on Object-Oriented Systems
The University of Texas at Dallas is seeking partners interested in broadening the software security technique of control-flow integrity (CFI) to support a much larger class of target application programs and architectures while further enhancing the security capabilities. Object Flow Integrity (OFI) is the first work to safely support inter-module...
Published: 4/26/2019
|
Inventor(s):
Kevin Hamlen
Keywords(s):
Computer
,
Electronics
,
Engineering & Physical Sciences
,
Internet of Things (IoT)
,
Software
Category(s):
Cybersecurity
,
Diagnostics
,
IT & Networking
Automatically Bridging the Semantic Gap in Virtual Machine Introspection
This invention encompasses a set of techniques to automatically bridge the semantic gap in virtual machine introspection thus allowing a trusted machine to inspect other machines (physical or virtual) safely, quickly, and reliably.Background:In Cloud Computing, a secure (“trusted”) virtual machine is often used to monitor (“introspect”)...
Published: 4/26/2019
|
Inventor(s):
Zhiqiang Lin
Keywords(s):
Cloud Computing
,
Communications
,
Electronics
,
Internet of Things (IoT)
,
Research Tools
,
Software
,
Wireless
Category(s):
Diagnostics
,
Cybersecurity