Search Results - data+security

12 Results Sort By:
Securing Camera and Photography Systems From Deepfakes by Verifying Provenance and Reducing Attack Surfaces (Case No. 2024-270)
Summary: Researchers in the UCLA Department of Electrical and Computer Engineering have developed a multi-layer security framework to verify deepfake imagery data. Background: The exponential improvements in generative AI pose serious implication to the rise of synthetic media or “deepfakes”. Soon, deepfake images and videos will be...
Published: 7/23/2024   |   Inventor(s): Alexander Vilesov, Achuta Kadambi, Yuan Tian, Nader Sehatbakhsh
Keywords(s): AI image security, Artificial Intelligence, artificial intelligence algorithms, Artificial Neural Network, Artificial Neural Network Artificial Neuron, artificial-intelligent materials, attack surface reduction, data security, Deep Learning, Deep learning-based sensing, deep physical neural network, deepfake, deepfake protection, deep-learning analysis algorithms, deep-learning fake (deepfake), generative artificial intelligence, image authenticity verification, image provenance, image signal processing, Medical artificial intelligence (AI), social media, third-party verification
Category(s): Software & Algorithms, Software & Algorithms > Artificial Intelligence & Machine Learning, Software & Algorithms > Image Processing, Software & Algorithms > Security & Privacy, Electrical, Electrical > Visual Computing, Electrical > Visual Computing > Video Processing
An Architecture for Security Health Monitoring and Attestation in Cloud Computing
Princeton Docket # 15-3171-1Researchers at Princeton University, Department of Electrical Engineering, have developed a distributed architecture to monitor and attest the security health of cloud customers' virtual machines (VMs) in a cloud computing system.Cloud providers want to monitor VMs to provide a secure and efficient computing environment to...
Published: 7/7/2023   |   Inventor(s): Ruby Lee, Tianwei Zhang
Keywords(s): computers/software, cyber security, data security
Category(s): Computer Science and Information Technology
Novel Highly Scalable Adaptive Photonic Beamformer Using "Blind" Guided Accelerated Random Search
Highly Scalable Adaptive Photonic Beamformer using “Blind” Guided Accelerated Random Search for Wireless CommunicationPrinceton Docket # 15-3056Researchers in the Department of Electrical Engineering at Princeton University have developed an adaptive photonic beamformer for use in wireless communication. Wireless communication has experienced...
Published: 3/30/2022   |   Inventor(s): John Chang, Paul Prucnal, James Meister
Keywords(s): big data, communications, cyber security, data security, Opto-Electronics/ELE ENG
Category(s): Mechanical/Electrical Engineering
Method and System for Performing Permutations with Bit Permutation Instructions
Princeton Docket #00-1709-1 The present invention provides permutation instructions which can be used in software executed in a programmable processor for solving permutation problems in cryptography, multimedia and other applications. PPERM and PPERM3R instructions are defined to perform permutations by a sequence of instructions with each sequence...
Published: 3/21/2024   |   Inventor(s): Ruby Lee, Zhijie Shi
Keywords(s): computers/software, cryptography, data security
Category(s): Computer Science and Information Technology
Fast Permutation Instructions for Processors based on the Butterfly Network (Cross Instruction)
Princeton Docket #00-1711-1 The present invention provides permutation instructions which can be used in software executed in a programmable processor for solving permutation problems in cryptography, multimedia and other applications. The permute instructions are based on a Benes network comprising two butterfly networks of the same size connected...
Published: 3/21/2024   |   Inventor(s): Ruby Lee, Xiao Yang, Manish Vachharajani
Keywords(s): computers/software, cryptography, data security
Category(s): Computer Science and Information Technology
OMFLIP - Fast Permutation Instruction for Processor based on Omega and Flip Networks
Princeton Docket #00-1710-1 The present invention provides permutation instructions which can be used in software executed in a programmable processor for solving permutation problems in cryptography, multimedia and other applications. The permute instructions are based on an omega-flip network comprising at least two stages in which each stage can...
Published: 3/21/2024   |   Inventor(s): Ruby Lee, Xiao Yang
Keywords(s): computers/software, cryptography, data security
Category(s): Computer Science and Information Technology
A New Design of Cache Memory in Computers that Improves Performance and Security
Princeton Docket #09-2526-1The invention is a new method of designing cache memories used in computers. It achieves best-in-class performance for various performance metrics, previously achievable only by different conventional cache architectures. In particular, it combines benefits of Fully-Associative caches and Direct-Mapped caches, in a novel way...
Published: 3/26/2024   |   Inventor(s): Ruby Lee, Zhenghong Wang
Keywords(s): computers/software, data security, microprocessor
Category(s): Computer Science and Information Technology
A General-Purpose Parallel Read Functional Unit That Can Accelerate Software AES Encryption and Decryption. Parallel Read Functional Unit for Microprocessor
Princeton Docket #09-2534-1This invention proposes a new functional unit to store constants and tables, and new instructions that can read multiple constants in parallel, to speed up the software processing of various algorithms, including the AES encryption and decryption algorithms. AES is the NIST’s Advanced Encryption Standard (AES) which...
Published: 3/30/2022   |   Inventor(s): Ruby Lee, Yu-Yuan Chen
Keywords(s): computers/software, cyber security, data security, microprocessor
Category(s): Computer Science and Information Technology
DataSafe - A Hardware-Software Architecture for Self-Protecting Data
Princeton Docket #14-2960 Computer applications are downloaded frequently from unknown sources. One has to trust that the applications do not do anything harmful. In cloud computing, third-party applications are frequently used, like analytics or management programs, to process proprietary or high value data. If these applications are allowed to process...
Published: 2/12/2024   |   Inventor(s): Ruby Lee, Pramod Jamkhedkar, Yu-Yuan Chen
Keywords(s): computers/software, data security
Category(s): Computer Science and Information Technology
Data Center Protection with Cyber-Physical Defenses
Princeton Docket #12-2821-1 Researchers at Princeton University have developed a novel method for the protection of data stored in computer data centers, such as used by Google, Facebook, Amazon and other cloud computing providers. Physical attacks compromising the security of information technology infrastructures have been identified as one of...
Published: 4/22/2024   |   Inventor(s): Ruby Lee, Jakub Szefer, Pramod Jamkhedkar, Yu-Yuan Chen
Keywords(s): computers/software, data security
Category(s): Computer Science and Information Technology
1 2