Search Results - cybersecurity

30 Results Sort By:
A Visual Brain Based Authentication
­Advantages: Increases data security by utilizing people’s brain data, which is more difficult to hack than traditional methods. Intuitive design that can be used in any domain, by adjusting the visual display. User-friendly interface that only requires a username and brain activity to create and access profile without the need to remember...
Published: 8/16/2024   |   Inventor(s): Tyree Lewis, Marvin Andujar
Keywords(s): Authentication and Biometric Systems, Cybersecurity
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Electronics > Electronics Sensors
FESA: Fast and Efficient Secure Aggregation for Privacy-Preserving Federated Learning
­Advantages: Protects user data during federated learning, ensuring individual privacy without compromising analysis. Minimizes data transfer, improves federated learning convergence speed and reducing resource consumption. Requires just one trustworthy assisting node, making implementation and scalability more straightforward. Summary: This...
Published: 9/3/2024   |   Inventor(s): Rouzbeh Behnia, Mohammedreza Ebrahimi, Thang Hoang, Balaji Padmanabhan
Keywords(s): Cybersecurity, Data Mining
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Computer Science > Computers Software & Information Technology
EW-Tune: A Framework for Privately Fine-Tuning Large Language Models with Differential Privacy
­Advantages: EW-Tune framework ensures robust privacy, preventing unauthorized access to sensitive AI data. Differing from conventional approaches, EW-Tune is custom-tailored for enhancing already established AI models, streamlining the process. Summary: This technology introduces EW-Tune, a pioneering solution aimed at refining AI language...
Published: 4/12/2024   |   Inventor(s): Mohammedreza Ebrahimi, Rouzbeh Behnia, Balaji Padmanabhan
Keywords(s): Artificial Intelligence, Cybersecurity
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI
Facilitating Security Verification of System Designs Using Adversarial Machine Learning
­Advantages: Enhanced vulnerability identification Efficient verification process Proactive vulnerability detection Business Summary: Businesses seek innovative solutions for growth, efficiency, and digital adaptation amid the pandemic, requiring professional, trustworthy services, open communication, and continuous learning. The difficulties...
Published: 4/24/2024   |   Inventor(s): Hao Zheng
Keywords(s): Artificial Intelligence, Computer Science, Computers Software and Information Technology, Cybersecurity, Data Mining, Electronics, Machine Learning, Semiconductors
Category(s): Technology Classifications > Computer Science, Technology Classifications > Data/AI, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Electronics, Technology Classifications > Engineering, Technology Classifications > Engineering > Electrical Engineering, Technology Classifications > Engineering > Computer Engineering, Technology Classifications > Medical > Cybersecurity
Resilient Multi-Robot System with Social Learning for Smart Factories
Advantages: This technology improves productivity, enabling seamless collaboration and optimized resource utilization in smart factories. The technology enhances the robustness and resilience of smart factories, maintaining objective performance under challenging circumstances. It strengthens security measures and cyber defense, ensuring the integrity...
Published: 9/3/2024   |   Inventor(s): Zixiang Nie, Kwang-Cheng Chen
Keywords(s): Artificial Intelligence, Cybersecurity, Industrial Applications, Robotics
Category(s): Technology Classifications > Data/AI, Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Engineering > Industrial Engineering
CYBERSECURITY: Reliability Of A Computer Network
Competitive Advantages This analytical model is developed using real data of the National Vulnerability Database, NVD. This analytical model is made up of data from Microsoft, Linux, and Apple computer operating systems that represents 99.34% of the market around the globe. This analytical model can identify the minimum number of steps, n, that...
Published: 7/12/2023   |   Inventor(s): Chris Tsokos, Freeh Alenezi
Keywords(s): Computers Software and Information Technology, Cryptography and Intrusion Detection, Cybersecurity, Diagnostic Tools for Network Vulnerability Evaluations
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity
Deploying Neural-Trojan-Resistant Convolutional Neural Networks for Self-Driving Vehicles
­Competitive Advantages This method can amplify Trojan’s malicious impact by making it more easily detectable so that system can provide rapid response and mitigation against the attacks This technology can prevent the spread of the attack to other connected systems and defend against attacks initiated through fake update requests The...
Published: 2/6/2024   |   Inventor(s): Robert Karam, Brooks Olney
Keywords(s): Autonomous Vehicle, Cryptography and Intrusion Detection, Cybersecurity, Hardware Based Security, Machine Learning
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Engineering > Autonomous Vehicle, Technology Classifications > Engineering > Computer Engineering, Technology Classifications > Computer Science > Algorithms, Technology Classifications > Computer Science > C/S Cybersecurity
Norm-Free Adaptive Event-Triggering Rule For Distributed Control Of Multiagent Systems
­Competitive Advantages Replaces global interactions with local information exchanges to improve scalability and security of multiagent systems. Significantly reduces agent-to-agent information exchange by removing norms and introducing an adaptive term. Helps prevent network overload and excessive energy use by agents via event-triggered rules. Summary Our...
Published: 11/7/2024   |   Inventor(s): Deniz Kurtoglu, Tansel Yucelen, Stefan Ristevski, Jonathan Muse
Keywords(s): Computers Software and Information Technology, Cybersecurity, Telecommunication / Wireless Communication
Category(s): Technology Classifications > Computer Science, Technology Classifications > Computer Science > Network Systems, Technology Classifications > Engineering > Mechanical Engineering, Technology Classifications > Engineering > Electrical Engineering, Technology Classifications > Engineering > Computer Engineering
Wireless Efficient Privacy, Authentication and Resiliency Technologies for Forensic and Sensitive Data
Competitive Advantages Shows a near-optimal performance at the logger (e.g., resource limited IoT device). Achieves post-quantum security. FHE-based alternatives are ideal for single-server setting without a collusion-risk. Develop strategies to achieve scalable signature verification for constructions. Summary This invention creates a new...
Published: 1/12/2023   |   Inventor(s): Attila Yavuz
Keywords(s): Cryptography and Intrusion Detection, Cybersecurity, Diagnostic Tools for Network Vulnerability Evaluations, Telecommunication and Wireless Communication
Category(s): Technology Classifications > Electronics > Electronics Telecommunications, Technology Classifications > Electronics, Technology Classifications > Computer Science > C/S Cybersecurity
Deep Cyber Vulnerability Mitigator
Competitive Advantages Organization-specific context-based threat detection and mitigation. Continuous refinement of defender’s policies according to the threats identified. Assignment of security personnel according to the threat level of vulnerability and skills of the individual. Summary Cyberthreats are increasing daily with continuously...
Published: 9/12/2024   |   Inventor(s): Ankit Shah
Keywords(s): Computer Science, Cybersecurity, Diagnostic Tools for Network Vulnerability Evaluations
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Computer Science > Algorithms
1 2 3