Search Results - technology+classifications+%3e+computer+science+%3e+c%2fs+cybersecurity

28 Results Sort By:
A Method for Modeling Distributions of Responses Using Personality-Based Prompting
Advantages Predict real-world behaviors with calibrated, human-centric AI personas. Improve accuracy and fairness in surveys, assessments, and decision tools. Reduce pilot costs through scalable, distribution-based forecasting. Provide transparent insights companies can audit and trust. Summary Organizations using surveys, cognitive assessments,...
Published: 9/8/2025   |   Inventor(s): John Licato, Animesh Nighojkar
Keywords(s): Data Mining, Image Tracking, Machine Learning
Category(s): Technology Classifications > Computer Science > Algorithms, Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Computer Science > Datasets, Technology Classifications > Data/AI > D/AI Imaging
A Divide and Conquer Framework for Breaking Unlearnable Data
Advantages Bypasses unlearnable image data through label modifications Achieves over 85% accuracy on protected datasets Work across multiple types of unlearnable data Use both manual and automated (genetic algorithm) approaches Reveal hidden weaknesses in current image protection methods Help researchers test and improve future unlearnable defenses Summary Unlearnable...
Published: 8/21/2025   |   Inventor(s): Hapuarachchige Thushari Hapuarachchi, Kaiqi Xiong
Keywords(s): Cybersecurity, Data Security, Datasets
Category(s): Technology Classifications > Computer Science > Algorithms, Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Computer Science > Datasets
A Lightweight Multiple-Time Post-quantum Signature for Heterogeneous Internet of Things
Advantages Maximizes key reuse, enabling over one million efficient post-quantum signatures Ultra-fast signing—up to 2463× faster than NIST PQ alternatives on ARM Uses only 1.4KB signer memory, ideal for low-end embedded IoT devices Sub-kilobyte signature size minimizes transmission energy in constrained IoT networks Summary The...
Published: 7/21/2025   |   Inventor(s): Attila Yavuz, Kiarash Sedghighadikolaei
Keywords(s): Cybersecurity, Internet of Things / IoT
Category(s): Technology Classifications > Computer Science > Algorithms, Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Electronics > Electronics Telecommunications, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Computer Science > C/S Sensors
Real-Time Program-Specific Log Consolidation for Intrusion Detection
Advantages Reduces logs 219× for efficient data storage Performs real-time analysis with zero offline cost Minimizes memory use through subject activity consolidation Maintains high detection accuracy with low alert fatigue Summary Enterprises today are increasingly targeted by Advanced Persistent Threats (APTs), stealthy, long-term attacks...
Published: 7/18/2025   |   Inventor(s): Yao Liu, Xiao Han, Zhuo Lu
Keywords(s): Computer Science, Cybersecurity
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Computer Science > Algorithms, Technology Classifications > Computer Science > Computers Software & Information Technology, Technology Classifications > Computer Science > Datasets
Efficient, Scalable and Post-Quantum Authentication for Real-time Next Generation Networks with Probabilistic Data Structures
Advantages: 4x to 6x faster key generation and up to 5x faster signature verification than existing methods Works on low-power devices like drones, smartwatches, and medical implants Post-quantum secure and designed for real-time communication needs Scales easily across large systems with many devices and users Summary: Modern wireless systems...
Published: 4/16/2025   |   Inventor(s): Attila Yavuz, Kiarash Sedghighadikolaei
Keywords(s):  
Category(s): Technology Classifications > Electronics > Electronics Telecommunications, Technology Classifications > Computer Science > C/S Cybersecurity
Privacy-Preserving and Post-Quantum Secure Counter Denial of Service
Advantages: Post-quantum secure protection against DoS and DDoS attacks Privacy-preserving spectrum access with location and identity anonymity Efficient puzzle outsourcing via Private Spectrum Bastions (PSBs) Flexible deployment options: hash-based, lattice-based, and blockchain-integrated Compliance-ready with FCC standards and NIST-approved...
Published: 6/11/2025   |   Inventor(s): Attila Yavuz, SALEH DARZI
Keywords(s): Cryptography and Intrusion Detection, Telecommunication / Wireless Communication
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Electronics > Electronics Telecommunications
Reinforcement Learning-Based Cooperative Adaptive Cruise Control Under False Data Injection Attacks
Advantages: Maintains safe inter-vehicle distance even under cyberattacks and disturbances Uses reinforcement learning with Lyapunov-based control for stability Features a neural network-based estimator to estimate and mitigate FDI attacks in real time Validated through simulation and real-world experimental testing Summary: Connected and automated...
Published: 7/18/2025   |   Inventor(s): Arman Sargolzaei, Parisa Ansari Bonab
Keywords(s): Autonomous Vehicle
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity
An Automated False Data Injection Attack Generator for Testing and Verification of Networked Control Systems
Advantages: Automated security testing for networked control systems (NCSs), eliminating the need for manual attack scenario creation Reinforcement learning (RL)-based approach efficiently generates attack scenarios to identify vulnerabilities Proven stability using Lyapunov-based analysis, ensuring attack generation with convergence guarantees Adaptable...
Published: 7/15/2025   |   Inventor(s): Arman Sargolzaei, Farahnaz Javidi Niroumand
Keywords(s): Artificial Intelligence, Autonomous Vehicle, Cybersecurity
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Data/AI > Cybersecurity - Data/AI
Universal and Efficient Detection of Adversarial Data through Nonuniform Impact on Network Layers
Advantages: Universal and real-time detection across image, video, and audio domains Lightweight and highly efficient, operating orders of magnitude faster than existing defenses Achieves 98% detection accuracy, significantly outperforming other methods Compatible with any Deep Neural Network (DNN) without requiring modifications Summary: Deep...
Published: 7/9/2025   |   Inventor(s): Yasin Yilmaz, Furkan Mumcu
Keywords(s): Artificial Intelligence, Cybersecurity
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Computer Science > C/S Cybersecurity
Defending Against Wi-Fi Spoofing Attacks Leveraging Physical-Layer Features
Advantages: Identifies Wi-Fi spoofing attacks by leveraging Doppler Effect and Symbol Timing Offset (STO) variations Protects against location manipulation, ensuring accurate navigation even in high-risk environments Improves navigation accuracy by differentiating legitimate and spoofed signals Cost-effective implementation with off-the-shelf...
Published: 1/22/2025   |   Inventor(s): Xiao Han, Yao Liu, Zhuo Lu
Keywords(s): Autonomous Vehicle, Cybersecurity , Telecommunication / Wireless Communication, Transportation
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Computer Science > Algorithms
1 2 3