Search Results - technology+classifications+%3e+data%2fai+%3e+cybersecurity+-+data%2fai

19 Results Sort By:
An Automated False Data Injection Attack Generator for Testing and Verification of Networked Control Systems
Advantages: Automated security testing for networked control systems (NCSs), eliminating the need for manual attack scenario creation Reinforcement learning (RL)-based approach efficiently generates attack scenarios to identify vulnerabilities Proven stability using Lyapunov-based analysis, ensuring attack generation with convergence guarantees Adaptable...
Published: 4/4/2025   |   Inventor(s): Arman Sargolzaei, Farahnaz Javidi Niroumand
Keywords(s): Artificial Intelligence, Autonomous Vehicle, Cybersecurity
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Data/AI > Cybersecurity - Data/AI
Universal and Efficient Detection of Adversarial Data through Nonuniform Impact on Network Layers
Advantages: Universal and real-time detection across image, video, and audio domains Lightweight and highly efficient, operating orders of magnitude faster than existing defenses Achieves 98% detection accuracy, significantly outperforming other methods Compatible with any Deep Neural Network (DNN) without requiring modifications Summary: Deep...
Published: 3/24/2025   |   Inventor(s): Yasin Yilmaz, Furkan Mumcu
Keywords(s): Artificial Intelligence, Cybersecurity
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Computer Science > C/S Cybersecurity
Unstructured Pruning for Multi-Layer Perceptrons with Tanh Activation
Advantages: Reduces neuron count by 72% (breast cancer) and 36.8% (MNIST) for efficiency Maintains high accuracy with only 5.25% average loss for MNIST dataset pruning Optimized for IoT and edge computing by reducing computational and memory needs Uses mean-based pruning for tanh activation to enhance model performance efficiently Summary: Modern...
Published: 1/30/2025   |   Inventor(s): Srinivas Katkoori, Lakshmi Kavya Kalyanam
Keywords(s): Machine Learning
Category(s): Technology Classifications > Computer Science > Network Systems, Technology Classifications > Data/AI > Cybersecurity - Data/AI
Three Connected V2V Applications Based on DSRC Basic Safety Messages
­Advantages: V2V warnings reduce accidents, enhancing road safety with advanced relative angle technology. Integrating relative angles boosts alert accuracy for more precise and effective warnings. Simulations show algorithm adaptability in diverse multi-lane scenarios, ensuring effectiveness. Summary: In the realm of motor vehicle safety,...
Published: 2/6/2024   |   Inventor(s): Srinivas Katkoori, Omkar Dokur, Gustavo Olenscki
Keywords(s): Internet of Things / IoT, Sensors, Transportation
Category(s): Technology Classifications > Engineering > Sensors, Technology Classifications > Computer Science > C/S Transportation, Technology Classifications > Computer Science > Algorithms, Technology Classifications > Data/AI > Cybersecurity - Data/AI
A Visual Brain Based Authentication
­Advantages: Increases data security by utilizing people’s brain data, which is more difficult to hack than traditional methods. Intuitive design that can be used in any domain, by adjusting the visual display. User-friendly interface that only requires a username and brain activity to create and access profile without the need to remember...
Published: 8/16/2024   |   Inventor(s): Tyree Lewis, Marvin Andujar
Keywords(s): Authentication and Biometric Systems, Cybersecurity
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Electronics > Electronics Sensors
FESA: Fast and Efficient Secure Aggregation for Privacy-Preserving Federated Learning
­Advantages: Protects user data during federated learning, ensuring individual privacy without compromising analysis. Minimizes data transfer, improves federated learning convergence speed and reducing resource consumption. Requires just one trustworthy assisting node, making implementation and scalability more straightforward. Summary: This...
Published: 9/3/2024   |   Inventor(s): Rouzbeh Behnia, Mohammedreza Ebrahimi, Thang Hoang, Balaji Padmanabhan
Keywords(s): Cybersecurity, Data Mining
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Computer Science > Computers Software & Information Technology
Door Access Control Using Wearable Biometrics
­Advantages: Biometric wearables strengthen access control, boosting safety measures effectively. Automation simplifies authentication, reducing wait times and improving efficiency. Wearable biometrics offer seamless, secure access, enhancing satisfaction. Summary: This innovative technology introduces a novel approach to door access control....
Published: 2/14/2025   |   Inventor(s): Tempestt Neal, Mohamed Ebraheem
Keywords(s): Sensors, Wearable Monitoring Equipment
Category(s): Technology Classifications > Electronics > Electronics Sensors, Technology Classifications > Data/AI > Cybersecurity - Data/AI
EW-Tune: A Framework for Privately Fine-Tuning Large Language Models with Differential Privacy
­Advantages: EW-Tune framework ensures robust privacy, preventing unauthorized access to sensitive AI data. Differing from conventional approaches, EW-Tune is custom-tailored for enhancing already established AI models, streamlining the process. Summary: This technology introduces EW-Tune, a pioneering solution aimed at refining AI language...
Published: 2/19/2025   |   Inventor(s): Reza Ebrahimi, Rouzbeh Behnia, Balaji Padmanabhan
Keywords(s): Artificial Intelligence, Cybersecurity
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI
Post-Quantum Forward-Secure Signatures with Hardware-Support for Internet of Things
­Advantages: HASES ensures robust and scalable authentication for IoT applications, safeguarding against compromise risks. HASES offers forward security without the need for expensive specialized hardware, making it practical for low-end IoT devices. HASES outperforms existing alternatives, achieving significantly faster speeds and greater...
Published: 9/3/2024   |   Inventor(s): Attila Yavuz, Saif Nouma
Keywords(s): Internet of Things / IoT
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Electronics > Electronics Sensors, Technology Classifications > Electronics > Nanotechnology
Facilitating Security Verification of System Designs Using Adversarial Machine Learning
­Advantages: Enhanced vulnerability identification Efficient verification process Proactive vulnerability detection Business Summary: Businesses seek innovative solutions for growth, efficiency, and digital adaptation amid the pandemic, requiring professional, trustworthy services, open communication, and continuous learning. The difficulties...
Published: 4/24/2024   |   Inventor(s): Hao Zheng
Keywords(s): Artificial Intelligence, Computer Science, Computers Software and Information Technology, Cybersecurity, Data Mining, Electronics, Machine Learning, Semiconductors
Category(s): Technology Classifications > Computer Science, Technology Classifications > Data/AI, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Electronics, Technology Classifications > Engineering, Technology Classifications > Engineering > Electrical Engineering, Technology Classifications > Engineering > Computer Engineering, Technology Classifications > Medical > Cybersecurity
1 2