Filter Results
Researcher
- Hsuan-Hao Lu
- Joseph Lukens
- Nicholas Peters
- Anees Alnajjar
- Joseph Chapman
- Muneer Alshowkan
- Chad Steed
- Chris Tyler
- Jaydeep Karandikar
- Junghoon Chae
- Kyle Kelley
- Mingyan Li
- Nageswara Rao
- Travis Humble
- Aaron Myers
- Akash Jag Prasad
- Alex Miloshevsky
- Benjamin Lawrie
- Bogdan Dryzhakov
- Brian Williams
- Burak Ozpineci
- Calen Kimmell
- Chengyun Hua
- Corey Cooke
- Craig A Bridges
- Gabor Halasz
- Gui-Jia Su
- Isaac Sikkema
- Jian Chen
- Jiaqiang Yan
- Joseph Olatt
- Justin Cazares
- Kunal Mondal
- Liam Collins
- Mahim Mathur
- Mariam Kiran
- Marti Checa Nualart
- Matt Larson
- Neus Domingo Marimon
- Oscar Martinez
- Pablo Moriano Salazar
- Pedro Ribeiro
- Petro Maksymovych
- Rama K Vasudevan
- Sam Hollifield
- Samudra Dasgupta
- Sheng Dai
- Stephen Jesse
- Steven Randolph
- Subho Mukherjee
- Vandana Rallabandi
- Vasiliy Morozov
- Vladimir Orlyanchik
- Zhili Feng

The technology provides a means for a nearly lossless modulation of a continuous variable (CV) optical field. This type of approach would be a viable approach to CV quantum secret sharing (QSS).

In a world which is becoming increasingly reliant upon data-driven

This generalized framework leverages recent technological advances in artificial intelligence, large scale distributed computing, a large repository of both overhead and ground based imagery databases to propose a GIScience based object detection and counting platform.

By exploiting the latest high-performance computing technique and advances in deep learning, we propose a state-of-the-art building mapping method based on convolutional neural network.

The invention relates to cyber security and more specifically to methods for detecting malicious traffic injection attacks on a vehicle's CAN bus.

In a large enterprise it is difficult for cyber security analysts to know what services and roles every machine on the network is performing (e.g., file server, domain name server, email server).

Our Scalable Mutual Information to Register Keypoints accurately computes multiple Normalized Mutual Information (NMI) coefficients to perform a two steps process to achieve coarse and fine registration.

The invention relates to network security and more specifically to Pass-the-Hash and Pass-the-Ticket credential theft attacks. Our invention is a way to centrally trigger the removal of all previously issued authentication credentials for a user on particular client comp

The invention relates to cyber security and more specifically to methods for detecting attacks. This invention supports detection of cyber attacks by generating a signal on the target machine that is disrupted by malware and intrusion events.

The invention relates to anomaly detection and more specifically to a novel graph-analytic approach for detecting anomalies in network flow data called GraphPrints.