Inteum Company
Links
seedsprint
Visible Legacy
RSS
News & Resources
Inteum Company News
Inteum Library
Subscribe
Search Results - security
18
Results
Sort By:
Published Date
Updated Date
Title
ID
Descending
Ascending
Adversarial Text Purification: Large Language Model Approach for Defense
Background Adversarial purification is a defense mechanism for safe-guarding classifiers against adversarial attacks without knowing the type of attacks or training of the classifier. These techniques analyze and eliminate adversarial perturbations from the attacked inputs, and help to restore purified samples that retain similarity to the attacked...
Published: 6/27/2025
|
Inventor(s):
Raha Moraffah
,
Shubh Khandelwal
,
Amrita Bhattacharjee
,
Huan Liu
Keywords(s):
Artificial Intelligence
,
Defense Applications
,
Machine Learning
,
Natural Language Processing
,
Security
,
Text Mining
Category(s):
Physical Science
,
Artificial Intelligence/Machine Learning
,
Applied Technologies
,
Cyber
security
Dynamic Quadruped with Tunable, Compliant Legs
In the realm of quadrupedal locomotion, there's a growing interest in understanding the concept of passive leg stiffness. This stiffness, when tuned correctly, can significantly influence a robot's locomotion dynamics and performance. However, integrating passive stiffness into quadruped robots has been challenging due to complexities in design,...
Published: 2/13/2025
|
Inventor(s):
Daniel Aukes
,
Fuchen Chen
Keywords(s):
Defense Applications
,
Engineering
,
Robotics
,
Security
Category(s):
Physical Science
Cyber Risk Loss Distribution Model of Client-Server Networks
Cyber risk has emerged as a significant threat to businesses that have increasingly relied on new and existing information technologies. Across various businesses in different industries and sectors, a distinct pattern of IT network architectures, such as the client-server network architecture, may expose those businesses, which share it, to similar...
Published: 2/13/2025
|
Inventor(s):
Stefano Chiaradonna
,
Petar Jevtic
,
Nicolas Lanchier
,
Sasa Pesic
Keywords(s):
Algorithm Development
,
Cyber
Security
,
Decision Support
,
Insurance
,
Machine Learning
,
Networks, IT, Software and Communication
,
PS-Computing and Information Technology
,
PS-Wireless and Networking
,
Reliability
,
Risk Assessment
,
Security
Category(s):
Computing & Information Technology
,
Intelligence &
Security
,
Physical Science
Machine Learning Algorithm for Inferring User Activities from IoT Device Events
The ubiquitous and heterogeneous deployment of internet of things (IoT) devices in smart homes has created new opportunities to extract knowledge, awareness, and intelligence via monitoring and understanding the devices’ interactions with their environments and users. Meaningful information from network traffic of IoT devices in smart homes can...
Published: 2/13/2025
|
Inventor(s):
Guoliang Xue
,
Yinxin Wan
,
Kuai Xu
,
Feng Wang
,
Xuanli Lin
Keywords(s):
Algorithm Development
,
Internet of Things
,
Machine Learning
,
Networks, IT, Software and Communication
,
PS-Computing and Information Technology
,
PS-Wireless and Networking
,
Security
Category(s):
Computing & Information Technology
,
Physical Science
,
Wireless & Networking
Algorithm for Inferring User Activities from IoT Network Traffic
Recently, the surge in Internet-of-things (IoT) device deployment within smart homes has led to a large need for understanding user activities through the vast data generated by these devices. While studies have explored individual device behaviors and network traffic patterns, there remains a gap in leveraging this data collectively to infer and monitor...
Published: 2/13/2025
|
Inventor(s):
Guoliang Xue
,
Yinxin Wan
,
Kuai Xu
,
Feng Wang
Keywords(s):
Algorithm Development
,
Internet of Things
,
Networks, IT, Software and Communication
,
PS-Computing and Information Technology
,
PS-Wireless and Networking
,
Security
Category(s):
Computing & Information Technology
,
Physical Science
,
Wireless & Networking
Predict Enterprise Cyber Incidents by Social Network Analysis on Dark Web Forums
There has been a rise in
security
breaches over the past few years, prompting an increasing need to mine insights from external discussion and social media platforms to raise alerts of possible attacks that might cater to specific industries. The dark web is one source of information on the internet where users can share information on software vulnerabilities...
Published: 2/13/2025
|
Inventor(s):
Soumajyoti Sarkar
,
Mohammed Almukaynizi
,
Jana Shakarian
,
Paulo Shakarian
Keywords(s):
Algorithm Development
,
Cyber
Security
,
Darknet/Darkweb
,
Machine Learning
,
PS-Computing and Information Technology
,
Security
,
Social Media Monitoring
Category(s):
Computing & Information Technology
,
Intelligence &
Security
,
Physical Science
Improving Angle Estimation Accuracy for Millimeter-Wave Radars
Radar systems transmit electromagnetic waves through the air and the objects in the aperture reflect the signal. The reflected signal is captured by the radar to find the position, angle, and velocity of each object. Millimeter-wave (mmWave) radar is a subclass of radar systems that uses millimeter waves to operate. The main advantage of mmWave radars...
Published: 2/13/2025
|
Inventor(s):
Sule Ozev
,
Ferhat Ataman
,
Chethan Kumar
,
Sandeep Rao
Keywords(s):
Aerospace
,
Communications Systems
,
Defense/military
,
Security
,
Signal Processing
Category(s):
Applied Technologies
,
Computing & Information Technology
,
Physical Science
Policy-Governed Content Mediation Model for Mobile Augmented Reality Applications
Mobile augmented reality (MAR) is a portable implementation of augmented reality (AR) that enables real-time interaction between digital content and the actual, physical world. Recently, it has been implemented in mobile applications (i.e., mobile augmented reality applications or MAR-Apps) accessible through smartphones, tablets, etc. However, even...
Published: 2/13/2025
|
Inventor(s):
Carlos Rubio-Medrano
,
Luis Claramunt
,
Jaejong Baek
,
Gail-Joon Ahn
Keywords(s):
Augmented Reality
,
Multimedia Apps
,
PS-Computing and Information Technology
,
Security
,
Social Media
Category(s):
Computing & Information Technology
,
Intelligence &
Security
,
Physical Science
2023-131 A Method for Video Motion Detection, Segmentation, and Compression
Summary: UCLA Researchers in the Department of Electrical and Computer Engineering have developed a new computationally efficient algorithm that detects and tracks motion in videos. Background: Computer vision and video processing have many applications in visual
security
and surveillance such as people counting, action recognition, anomaly detection,...
Published: 2/14/2025
|
Inventor(s):
Bahram Jalali
,
Yiming Zhou
,
Callen MacPhee
Keywords(s):
Autonomous driving
,
computational imaging
,
Computer Monitor
,
Computer
Security
,
Computer Vision
,
computer vision algorithm
,
Computer-Aided Design
,
data Compression
,
Data Recovery
,
Energy
Security
,
event detection
,
Human tracking
,
Image Analysis
,
image and video enhancement
,
Image Processing
,
image restoration
,
Liquid tracking
,
Metal process monitoring
,
motion detection
,
object recognition
,
real-time sensing/monitoring/tracking
,
security
,
Security
and defense
,
security
imaging
,
Structural health monitoring
,
Vibration monitoring
,
Vibration sensing
,
video pre-processing
,
video processing
,
visual
security
and surveillance
Category(s):
Software & Algorithms
,
Software & Algorithms > Image Processing
,
Software & Algorithms >
Security
& Privacy
,
Software & Algorithms > Programs
Authenticating a User on a Mobile Device
Protecting mobile devices from unauthorized access is becoming more than indispensable these days. In particular, mobile devices such as smartphones and tablets are pervasive and store increasingly highly sensitive information about a user (e.g., contacts, usernames, passwords, emails, browser histories, business secrets, health conditions, etc.)....
Published: 2/13/2025
|
Inventor(s):
Yimin Chen
,
Yanchao Zhang
Keywords(s):
Authentication
,
Detection
,
Mobile technology
,
Recognition imaging
,
Security
,
Transactions
Security
Category(s):
Computing & Information Technology
,
Physical Science
,
Intelligence &
Security
1
2