Search Results - technology+classifications+%3e+data%2fai+%3e+cybersecurity+-+data%2fai

23 Results Sort By:
A Lightweight Multiple-Time Post-quantum Signature for Heterogeneous Internet of Things
Advantages Maximizes key reuse, enabling over one million efficient post-quantum signatures Ultra-fast signing—up to 2463× faster than NIST PQ alternatives on ARM Uses only 1.4KB signer memory, ideal for low-end embedded IoT devices Sub-kilobyte signature size minimizes transmission energy in constrained IoT networks Summary The...
Published: 7/21/2025   |   Inventor(s): Attila Yavuz, Kiarash Sedghighadikolaei
Keywords(s): Cybersecurity, Internet of Things / IoT
Category(s): Technology Classifications > Computer Science > Algorithms, Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Electronics > Electronics Telecommunications, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Computer Science > C/S Sensors
Advancing Ensemble Learning Against Unlearnable Data
Advantages Integrates seamlessly into enterprise workflows Scales from edge devices to GPU clusters Guarantees compliance with data-protection standards Enhances ensemble learning with data augmentation and model diversity Recovers >89% test accuracy on datasets protected by 12 state-of-the-art unlearnable data methods Summary As AI adoption...
Published: 7/15/2025   |   Inventor(s): Hapuarachchige Thushari Hapuarachchi, Kaiqi Xiong
Keywords(s):  
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Computer Science > Algorithms
Custom AI Co-Pilot for Software Security Pen-Testing
Advantages: Helps scale pen-testing efforts by assisting human testers with AI Learns from each test and gets better over time Built to match real-world workflows using open-source tools and prompts Outperforms traditional tools like SonarQube with prompt customization Summary: Penetration testing is critical for finding security flaws in software....
Published: 4/18/2025   |   Inventor(s): Xinming (Simon) Ou, Dmitry Goldgof, Jarred Ligatti, Lawrence Hall
Keywords(s): Artificial Intelligence, Cybersecurity
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI
Improving Facial Recognition Systems Against Unlearnable Data
Advantages: Dramatically reduces the impact of unlearnable noise using smart data transformations Recovers facial recognition accuracy from nearly 0% to over 85% Designed for large facial datasets with limited number of images per person Summary: Some facial datasets are made "unlearnable" by adding small, hidden changes that stop...
Published: 4/17/2025   |   Inventor(s): Kaiqi Xiong, Long Kim Dang, Hapuarachchige Thushari Hapuarachchi
Keywords(s):  
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI
An Automated False Data Injection Attack Generator for Testing and Verification of Networked Control Systems
Advantages: Automated security testing for networked control systems (NCSs), eliminating the need for manual attack scenario creation Reinforcement learning (RL)-based approach efficiently generates attack scenarios to identify vulnerabilities Proven stability using Lyapunov-based analysis, ensuring attack generation with convergence guarantees Adaptable...
Published: 7/15/2025   |   Inventor(s): Arman Sargolzaei, Farahnaz Javidi Niroumand
Keywords(s): Artificial Intelligence, Autonomous Vehicle, Cybersecurity
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Data/AI > Cybersecurity - Data/AI
Universal and Efficient Detection of Adversarial Data through Nonuniform Impact on Network Layers
Advantages: Universal and real-time detection across image, video, and audio domains Lightweight and highly efficient, operating orders of magnitude faster than existing defenses Achieves 98% detection accuracy, significantly outperforming other methods Compatible with any Deep Neural Network (DNN) without requiring modifications Summary: Deep...
Published: 7/9/2025   |   Inventor(s): Yasin Yilmaz, Furkan Mumcu
Keywords(s): Artificial Intelligence, Cybersecurity
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Computer Science > C/S Cybersecurity
Unstructured Pruning for Multi-Layer Perceptrons with Tanh Activation
Advantages: Reduces neuron count by 72% (breast cancer) and 36.8% (MNIST) for efficiency Maintains high accuracy with only 5.25% average loss for MNIST dataset pruning Optimized for IoT and edge computing by reducing computational and memory needs Uses mean-based pruning for tanh activation to enhance model performance efficiently Summary: Modern...
Published: 1/30/2025   |   Inventor(s): Srinivas Katkoori, Lakshmi Kavya Kalyanam
Keywords(s): Machine Learning
Category(s): Technology Classifications > Computer Science > Network Systems, Technology Classifications > Data/AI > Cybersecurity - Data/AI
Three Connected V2V Applications Based on DSRC Basic Safety Messages
­Advantages: V2V warnings reduce accidents, enhancing road safety with advanced relative angle technology. Integrating relative angles boosts alert accuracy for more precise and effective warnings. Simulations show algorithm adaptability in diverse multi-lane scenarios, ensuring effectiveness. Summary: In the realm of motor vehicle safety,...
Published: 2/6/2024   |   Inventor(s): Srinivas Katkoori, Omkar Dokur, Gustavo Olenscki
Keywords(s): Internet of Things / IoT, Sensors, Transportation
Category(s): Technology Classifications > Engineering > Sensors, Technology Classifications > Computer Science > C/S Transportation, Technology Classifications > Computer Science > Algorithms, Technology Classifications > Data/AI > Cybersecurity - Data/AI
A Visual Brain Based Authentication
­Advantages: Increases data security by utilizing people’s brain data, which is more difficult to hack than traditional methods. Intuitive design that can be used in any domain, by adjusting the visual display. User-friendly interface that only requires a username and brain activity to create and access profile without the need to remember...
Published: 8/16/2024   |   Inventor(s): Tyree Lewis, Marvin Andujar
Keywords(s): Authentication and Biometric Systems, Cybersecurity
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Electronics > Electronics Sensors
FESA: Fast and Efficient Secure Aggregation for Privacy-Preserving Federated Learning
­Advantages: Protects user data during federated learning, ensuring individual privacy without compromising analysis. Minimizes data transfer, improves federated learning convergence speed and reducing resource consumption. Requires just one trustworthy assisting node, making implementation and scalability more straightforward. Summary: This...
Published: 9/3/2024   |   Inventor(s): Rouzbeh Behnia, Mohammedreza Ebrahimi, Thang Hoang, Balaji Padmanabhan
Keywords(s): Cybersecurity, Data Mining
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Computer Science > Computers Software & Information Technology
1 2 3