Search Results - danfeng+yao

4 Results Sort By:
Endothelium-Specific Laminin Reporter Mouse Line Laminin-mCherry/eGFP+/–; Cdh5-CreER+/– Mouse Line
Advantages Enables endothelial-specific labeling of laminin-γ1 in vivo. Tamoxifen-inducible system allows temporal control of recombination. Dual-color fluorescence distinguishes target cell-derived laminin from other cell-derived laminin. Co-localization with laminin-γ1 antibody confirms biological fidelity. Facilitates mapping...
Published: 10/9/2025   |   Inventor(s): Yao Yao
Keywords(s): Animal Models, Research Tools
Category(s): Technology Classifications > Research Tools/Copyright > Animal Models
Novel Laminin Reporter Mouse Line for in vivo Imaging and Laminin Biology Research (Laminin-mCherry/eGFP+/-) Pre-Cre
Advantages First-ever dual-color laminin reporter mouse line. Enables visualization of laminin-γ1 expression in vivo with high fidelity. mCherry signal replicates endogenous laminin distribution without Cre activation. No background eGFP signal ensures clean baseline imaging. Targets the widely expressed γ1 subunit, enhancing...
Published: 10/9/2025   |   Inventor(s): Yao Yao
Keywords(s): Animal Models, Neuroscience, Research Tools
Category(s): Technology Classifications > Research Tools/Copyright > Animal Models
Continuous Monitoring with Compact System Representations to Detect Advanced Persistent Threats
THE CHALLENGE The growing danger of Advanced Persistent Threats (APTs), stealthy, multi-stage cyberattacks, poses a major challenge to detect subtle malicious behaviors hidden within massive volumes of system audit logs without overwhelming their infrastructure. Traditional defenses rely on constructing detailed provenance graphs to trace system activity,...
Published: 10/9/2025   |   Inventor(s): Danfeng Yao, Wenjia Song
Keywords(s):  
Category(s): Technology Classifications > Security
Detection of Botnet Malware using AI-based Keystroke Dynamics
Remote authentication framework (TUBA) Summary: Key loggers are a form of malware (bots) that eavesdrop on users to steal keystroke sequences that can then be used to hack individual’s identity. This form of malware enables the capture of user ids, passwords, credit card numbers, bank accounts and pins – causing personal, governmental,...
Published: 8/12/2025   |   Inventor(s): Danfeng Yao, Deian Stefan, Chehai Wu, Hao Zhang
Keywords(s):  
Category(s): Technology Classifications > Software & Copyright, Technology Classifications > Software & Algorithms, Technology Classifications > Artificial Intelligence & Machine Learning