Search Results - technology+classifications+%3e+data%2fai+%3e+cybersecurity+-+data%2fai

17 Results Sort By:
Three Connected V2V Applications Based on DSRC Basic Safety Messages
­Advantages: V2V warnings reduce accidents, enhancing road safety with advanced relative angle technology. Integrating relative angles boosts alert accuracy for more precise and effective warnings. Simulations show algorithm adaptability in diverse multi-lane scenarios, ensuring effectiveness. Summary: In the realm of motor vehicle safety,...
Published: 2/6/2024   |   Inventor(s): Srinivas Katkoori, Omkar Dokur, Gustavo Olenscki
Keywords(s): Internet of Things / IoT, Sensors, Transportation
Category(s): Technology Classifications > Engineering > Sensors, Technology Classifications > Computer Science > C/S Transportation, Technology Classifications > Computer Science > Algorithms, Technology Classifications > Data/AI > Cybersecurity - Data/AI
Spatio-temporal Graph Analytics on Secondary Affect Data for Improving Trustworthy Emotional AI
­Advantages: Enhances analysis with a comprehensive view, nuanced understanding of affect data. Captures evolving patterns in affective computing with precise spatio-temporal insight. Unveils biases in affect data, facilitating ethical development through analytics. Summary: In the realm of affective computing (AC), the current challenge...
Published: 9/18/2024   |   Inventor(s): Shaun Canavan, Md Taufeeq Uddin, Lijun Yin
Keywords(s): Artificial Intelligence, Health Tech, Predictive Analytics
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Medical > Biomedical Engineering, Technology Classifications > Medical > Medical Diagnostics
A Visual Brain Based Authentication
­Advantages: Increases data security by utilizing people’s brain data, which is more difficult to hack than traditional methods. Intuitive design that can be used in any domain, by adjusting the visual display. User-friendly interface that only requires a username and brain activity to create and access profile without the need to remember...
Published: 8/16/2024   |   Inventor(s): Tyree Lewis, Marvin Andujar
Keywords(s): Authentication and Biometric Systems, Cybersecurity
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Electronics > Electronics Sensors
FESA: Fast and Efficient Secure Aggregation for Privacy-Preserving Federated Learning
­Advantages: Protects user data during federated learning, ensuring individual privacy without compromising analysis. Minimizes data transfer, improves federated learning convergence speed and reducing resource consumption. Requires just one trustworthy assisting node, making implementation and scalability more straightforward. Summary: This...
Published: 9/3/2024   |   Inventor(s): Rouzbeh Behnia, Mohammedreza Ebrahimi, Thang Hoang, Balaji Padmanabhan
Keywords(s): Cybersecurity, Data Mining
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Computer Science > Computers Software & Information Technology
Door Access Control Using Wearable Biometrics
­Advantages: Biometric wearables strengthen access control, boosting safety measures effectively. Automation simplifies authentication, reducing wait times and improving efficiency. Wearable biometrics offer seamless, secure access, enhancing satisfaction. Summary: This innovative technology introduces a novel approach to door access control....
Published: 6/4/2024   |   Inventor(s): Tempestt Neal, Mohamed Ebraheem
Keywords(s): Sensors, Wearable Monitoring Equipment
Category(s): Technology Classifications > Electronics > Electronics Sensors, Technology Classifications > Data/AI > Cybersecurity - Data/AI
EW-Tune: A Framework for Privately Fine-Tuning Large Language Models with Differential Privacy
­Advantages: EW-Tune framework ensures robust privacy, preventing unauthorized access to sensitive AI data. Differing from conventional approaches, EW-Tune is custom-tailored for enhancing already established AI models, streamlining the process. Summary: This technology introduces EW-Tune, a pioneering solution aimed at refining AI language...
Published: 4/12/2024   |   Inventor(s): Mohammedreza Ebrahimi, Rouzbeh Behnia, Balaji Padmanabhan
Keywords(s): Artificial Intelligence, Cybersecurity
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI
Post-Quantum Forward-Secure Signatures with Hardware-Support for Internet of Things
­Advantages: HASES ensures robust and scalable authentication for IoT applications, safeguarding against compromise risks. HASES offers forward security without the need for expensive specialized hardware, making it practical for low-end IoT devices. HASES outperforms existing alternatives, achieving significantly faster speeds and greater...
Published: 9/3/2024   |   Inventor(s): Attila Yavuz, Saif Nouma
Keywords(s): Internet of Things / IoT
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Electronics > Electronics Sensors, Technology Classifications > Electronics > Nanotechnology
Facilitating Security Verification of System Designs Using Adversarial Machine Learning
­Advantages: Enhanced vulnerability identification Efficient verification process Proactive vulnerability detection Business Summary: Businesses seek innovative solutions for growth, efficiency, and digital adaptation amid the pandemic, requiring professional, trustworthy services, open communication, and continuous learning. The difficulties...
Published: 4/24/2024   |   Inventor(s): Hao Zheng
Keywords(s): Artificial Intelligence, Computer Science, Computers Software and Information Technology, Cybersecurity, Data Mining, Electronics, Machine Learning, Semiconductors
Category(s): Technology Classifications > Computer Science, Technology Classifications > Data/AI, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Electronics, Technology Classifications > Engineering, Technology Classifications > Engineering > Electrical Engineering, Technology Classifications > Engineering > Computer Engineering, Technology Classifications > Medical > Cybersecurity
System and Method for Reducing a Threat Footprint of an Area-of-Interest
Advantages: The AI-enabled technology automates the risk assessment process and eliminates the need for manual techniques, which can be time-consuming and prone to human error. By leveraging AI, the technology is able to learn patterns and analyze complex data, uncovering new and previously unrecognized attack paths and strategies. The methodical...
Published: 2/6/2024   |   Inventor(s): Ankit Shah, Soumyadeep Hore, Dinesh Sharma
Keywords(s): Artificial Intelligence, Diagnostic Tools for Network Vulnerability Evaluations, Machine Learning
Category(s): Technology Classifications > Software > Multimedia, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Computer Science > Algorithms, Technology Classifications > Computer Science > C/S Cybersecurity
Graphene Based Scheme for IoT and Forensic Applications
Competitive Advantages This Graphene based scheme is profoundly lightweight but offers strong features, which make it ideal for resource-restricted IoT applications. This scheme provides a solution for application where it requires the minimal expense and wide organization of sensors, like in smart cities, and combat zones, wherein forward-security...
Published: 9/3/2024   |   Inventor(s): Attila Yavuz
Keywords(s): Health Tech, Internet of Things / IoT, Medical Devices
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Computer Science > C/S Sensors, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Engineering > Computer Engineering, Technology Classifications > Medical > Cybersecurity, Technology Classifications > Medical > Medical Devices
1 2