Search Results - data+security

15 Results Sort By:
Secure Agents for Flexible Clean Rooms and Access Control (Case No. 2026-043)
Summary: UCLA researchers in the Department of Computer Engineering and Mathematics have developed virtual secure agents that enable efficient, privacy-preserving collaborative computation across all standard cloud environments. Background: Data clean rooms are secured environments that allow multiple parties to safely upload and exchange data between...
Published: 10/28/2025   |   Inventor(s): Rafail Ostrovsky, Sam Kumar, Nakul Khambhati, Joonwon Lee, Gary Song
Keywords(s): Cloud Computing, Computer Security, Condition monitoring, Data Analytics, data security, Data Structure, Database management/data entry, Dynamic Random-Access Memory, multiparty network, scalable communication, security, Security and defense
Category(s): Software & Algorithms, Software & Algorithms > Communication & Networking, Software & Algorithms > Data Analytics, Software & Algorithms > Security & Privacy
Construction of Low-Rate LDPC Codes From Rate-½ CCSDS Standard LDPC Codes (Case No. 2025-243)
Reference: UCLA Case No. 2025-243. Please reach out to our office for more information.
Published: 10/7/2025   |   Inventor(s): Richard Wesel, Semira Galijasevic, Linfang Wang, Jon Hamkins, Dariush Divsalar
Keywords(s): Aerospace, Aerospace Engineering, Communication & Networking, Communications Satellite, data Compression, data security, Electrical, Electrical Engineering, energy-efficient wireless communication, high-speed communications, latency encoding, quantum communication, scalable communication, signal decoding, Signal Processing, Signal-To-Noise Ratio, transmission enhancement, wireless communication
Category(s): Software & Algorithms, Software & Algorithms > Communication & Networking, Software & Algorithms > Security & Privacy, Electrical, Electrical > Signal Processing
A Divide and Conquer Framework for Breaking Unlearnable Data
Advantages Bypasses unlearnable image data through label modifications Achieves over 85% accuracy on protected datasets Work across multiple types of unlearnable data Use both manual and automated (genetic algorithm) approaches Reveal hidden weaknesses in current image protection methods Help researchers test and improve future unlearnable defenses Summary Unlearnable...
Published: 8/21/2025   |   Inventor(s): Hapuarachchige Thushari Hapuarachchi, Kaiqi Xiong
Keywords(s): Cybersecurity, Data Security, Datasets
Category(s): Technology Classifications > Computer Science > Algorithms, Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Computer Science > Datasets
Synapticflow Universal Scientific MPC/API Gateway (Case No. 2025-265)
Summary: UCLA researchers in the Department of Microbiology, Immunology, and Molecular Genetics have developed an advanced API gateway that leverages AI to autonomously process data requests with exceptional speed, reliability, and efficiency. Background: Application Programming Interface (API) infrastructures are universally employed to enable...
Published: 8/19/2025   |   Inventor(s): Lulan Wang
Keywords(s): AI, AI algorithms, Artifical Intelligence (Machine Learning, Data Mining), Coronavirus, Data Acquisition, Data Analytics, data security, Data Structure, Drug Discovery, drug screening, high speed, Medical diagnostics, Software, Software & Algorithms, Software Development Tools
Category(s): Software & Algorithms, Software & Algorithms > AI Algorithms, Software & Algorithms > Artificial Intelligence & Machine Learning, Software & Algorithms > Bioinformatics, Software & Algorithms > Data Analytics
An Architecture for Security Health Monitoring and Attestation in Cloud Computing
Princeton Docket # 15-3171-1Researchers at Princeton University, Department of Electrical Engineering, have developed a distributed architecture to monitor and attest the security health of cloud customers' virtual machines (VMs) in a cloud computing system.Cloud providers want to monitor VMs to provide a secure and efficient computing environment to...
Published: 2/25/2025   |   Inventor(s): Ruby Lee, Tianwei Zhang
Keywords(s): computers/software, cyber security, data security
Category(s): Computer Science and Information Technology
Novel Highly Scalable Adaptive Photonic Beamformer Using "Blind" Guided Accelerated Random Search
Highly Scalable Adaptive Photonic Beamformer using “Blind” Guided Accelerated Random Search for Wireless CommunicationPrinceton Docket # 15-3056Researchers in the Department of Electrical Engineering at Princeton University have developed an adaptive photonic beamformer for use in wireless communication. Wireless communication has experienced...
Published: 3/30/2022   |   Inventor(s): John Chang, Paul Prucnal, James Meister
Keywords(s): big data, communications, cyber security, data security, Opto-Electronics/ELE ENG
Category(s): Mechanical/Electrical Engineering
Method and System for Performing Permutations with Bit Permutation Instructions
Princeton Docket #00-1709-1 The present invention provides permutation instructions which can be used in software executed in a programmable processor for solving permutation problems in cryptography, multimedia and other applications. PPERM and PPERM3R instructions are defined to perform permutations by a sequence of instructions with each sequence...
Published: 3/21/2024   |   Inventor(s): Ruby Lee, Zhijie Shi
Keywords(s): computers/software, cryptography, data security
Category(s): Computer Science and Information Technology
Fast Permutation Instructions for Processors based on the Butterfly Network (Cross Instruction)
Princeton Docket #00-1711-1 The present invention provides permutation instructions which can be used in software executed in a programmable processor for solving permutation problems in cryptography, multimedia and other applications. The permute instructions are based on a Benes network comprising two butterfly networks of the same size connected...
Published: 3/21/2024   |   Inventor(s): Ruby Lee, Xiao Yang, Manish Vachharajani
Keywords(s): computers/software, cryptography, data security
Category(s): Computer Science and Information Technology
OMFLIP - Fast Permutation Instruction for Processor based on Omega and Flip Networks
Princeton Docket #00-1710-1 The present invention provides permutation instructions which can be used in software executed in a programmable processor for solving permutation problems in cryptography, multimedia and other applications. The permute instructions are based on an omega-flip network comprising at least two stages in which each stage can...
Published: 3/21/2024   |   Inventor(s): Ruby Lee, Xiao Yang
Keywords(s): computers/software, cryptography, data security
Category(s): Computer Science and Information Technology
A New Design of Cache Memory in Computers that Improves Performance and Security
Princeton Docket #09-2526-1The invention is a new method of designing cache memories used in computers. It achieves best-in-class performance for various performance metrics, previously achievable only by different conventional cache architectures. In particular, it combines benefits of Fully-Associative caches and Direct-Mapped caches, in a novel way...
Published: 10/31/2024   |   Inventor(s): Ruby Lee, Zhenghong Wang
Keywords(s): computers/software, data security, microprocessor
Category(s): Computer Science and Information Technology
1 2