Search Results - security

19 Results Sort By:
Dynamic Quadruped with Tunable, Compliant Legs
In the realm of quadrupedal locomotion, there's a growing interest in understanding the concept of passive leg stiffness. This stiffness, when tuned correctly, can significantly influence a robot's locomotion dynamics and performance. However, integrating passive stiffness into quadruped robots has been challenging due to complexities in design,...
Published: 3/27/2024   |   Inventor(s): Daniel Aukes, Fuchen Chen
Keywords(s): Defense Applications, Engineering, Robotics, Security
Category(s): Physical Science
Cyber Risk Loss Distribution Model of Client-Server Networks
Cyber risk has emerged as a significant threat to businesses that have increasingly relied on new and existing information technologies. Across various businesses in different industries and sectors, a distinct pattern of IT network architectures, such as the client-server network architecture, may expose those businesses, which share it, to similar...
Published: 3/18/2024   |   Inventor(s): Stefano Chiaradonna, Petar Jevtic, Nicolas Lanchier, Sasa Pesic
Keywords(s): Algorithm Development, Cyber Security, Decision Support, Insurance, Machine Learning, Networks, IT, Software and Communication, PS-Computing and Information Technology, PS-Wireless and Networking, Reliability, Risk Assessment, Security
Category(s): Computing & Information Technology, Intelligence & Security, Physical Science
Machine Learning Algorithm for Inferring User Activities from IoT Device Events
The ubiquitous and heterogeneous deployment of internet of things (IoT) devices in smart homes has created new opportunities to extract knowledge, awareness, and intelligence via monitoring and understanding the devices’ interactions with their environments and users. Meaningful information from network traffic of IoT devices in smart homes can...
Published: 2/14/2024   |   Inventor(s): Guoliang Xue, Yinxin Wan, Kuai Xu, Feng Wang, Xuanli Lin
Keywords(s): Algorithm Development, Internet of Things, Machine Learning, Networks, IT, Software and Communication, PS-Computing and Information Technology, PS-Wireless and Networking, Security
Category(s): Computing & Information Technology, Physical Science, Wireless & Networking
Algorithm for Inferring User Activities from IoT Network Traffic
Recently, the surge in Internet-of-things (IoT) device deployment within smart homes has led to a large need for understanding user activities through the vast data generated by these devices. While studies have explored individual device behaviors and network traffic patterns, there remains a gap in leveraging this data collectively to infer and monitor...
Published: 11/22/2023   |   Inventor(s): Guoliang Xue, Yinxin Wan, Kuai Xu, Feng Wang
Keywords(s): Algorithm Development, Internet of Things, Networks, IT, Software and Communication, PS-Computing and Information Technology, PS-Wireless and Networking, Security
Category(s): Computing & Information Technology, Physical Science, Wireless & Networking
Predict Enterprise Cyber Incidents by Social Network Analysis on Dark Web Forums
There has been a rise in security breaches over the past few years, prompting an increasing need to mine insights from external discussion and social media platforms to raise alerts of possible attacks that might cater to specific industries. The dark web is one source of information on the internet where users can share information on software vulnerabilities...
Published: 8/8/2023   |   Inventor(s): Soumajyoti Sarkar, Mohammed Almukaynizi, Jana Shakarian, Paulo Shakarian
Keywords(s): Algorithm Development, Cyber Security, Darknet/Darkweb, Machine Learning, PS-Computing and Information Technology, Security, Social Media Monitoring
Category(s): Computing & Information Technology, Intelligence & Security, Physical Science
Improving Angle Estimation Accuracy for Millimeter-Wave Radars
Radar systems transmit electromagnetic waves through the air and the objects in the aperture reflect the signal. The reflected signal is captured by the radar to find the position, angle, and velocity of each object. Millimeter-wave (mmWave) radar is a subclass of radar systems that uses millimeter waves to operate. The main advantage of mmWave radars...
Published: 8/8/2023   |   Inventor(s): Sule Ozev, Ferhat Ataman, Chethan Kumar, Sandeep Rao
Keywords(s): Aerospace, Communications Systems, Defense/military, Security, Signal Processing
Category(s): Applied Technologies, Computing & Information Technology, Physical Science
Policy-Governed Content Mediation Model for Mobile Augmented Reality Applications
Mobile augmented reality (MAR) is a portable implementation of augmented reality (AR) that enables real-time interaction between digital content and the actual, physical world. Recently, it has been implemented in mobile applications (i.e., mobile augmented reality applications or MAR-Apps) accessible through smartphones, tablets, etc. However, even...
Published: 5/31/2023   |   Inventor(s): Carlos Rubio-Medrano, Luis Claramunt, Jaejong Baek, Gail-Joon Ahn
Keywords(s): Augmented Reality, Multimedia Apps, PS-Computing and Information Technology, Security, Social Media
Category(s): Computing & Information Technology, Intelligence & Security, Physical Science
2023-131 A Method for Video Motion Detection, Segmentation, and Compression
Summary: UCLA Researchers in the Department of Electrical and Computer Engineering have developed a new computationally efficient algorithm that detects and tracks motion in videos. Background: Computer vision and video processing have many applications in visual security and surveillance such as people counting, action recognition, anomaly detection,...
Published: 8/7/2023   |   Inventor(s): Bahram Jalali, Yiming Zhou, Callen MacPhee
Keywords(s): Autonomous driving, computational imaging, Computer Monitor, Computer Security, Computer Vision, computer vision algorithm, Computer-Aided Design, data Compression, Data Recovery, Energy Security , event detection, Human tracking, Image Analysis, image and video enhancement, Image Processing, image restoration, Liquid tracking, Metal process monitoring, motion detection, object recognition, real-time sensing/monitoring/tracking, security, Security and defense, security imaging, Structural health monitoring, Vibration monitoring, Vibration sensing, video pre-processing, video processing, visual security and surveillance
Category(s): Software & Algorithms, Software & Algorithms > Image Processing, Software & Algorithms > Security & Privacy, Software & Algorithms > Programs
Authenticating a User on a Mobile Device
Protecting mobile devices from unauthorized access is becoming more than indispensable these days. In particular, mobile devices such as smartphones and tablets are pervasive and store increasingly highly sensitive information about a user (e.g., contacts, usernames, passwords, emails, browser histories, business secrets, health conditions, etc.)....
Published: 2/27/2023   |   Inventor(s): Yimin Chen, Yanchao Zhang
Keywords(s): Authentication, Detection, Mobile technology, Recognition imaging, Security, Transactions Security
Category(s): Computing & Information Technology, Physical Science, Intelligence & Security
Decentralized Attribution of Generative Models
­Background Growing applications of generative models have led to new threats such as malicious personation and digital copyright infringement. One solution to these threats is model attribution, i.e., the identification of user-end models where the contents under question are generated from. Existing studies showed empirical feasibility of attribution...
Published: 2/23/2023   |   Inventor(s): Yezhou Yang, Changhoon Kim, Yi Ren
Keywords(s): Security
Category(s): Physical Science, Computing & Information Technology, Intelligence & Security
1 2