Patents by Inventor Howie XU

Howie XU has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210377303
    Abstract: Systems and methods include receiving a domain for a determination of a likelihood the domain is malicious or benign; obtaining data associated with the domain including log data from a cloud-based system that performs monitoring of a plurality of users; analyzing the domain with a plurality of components to assess the likelihood, wherein at least one of the plurality of components is a trained machine learning model; and combining results of the plurality of components to predict the likelihood the domain is malicious or benign.
    Type: Application
    Filed: June 8, 2021
    Publication date: December 2, 2021
    Inventors: Loc Bui, Dianhuan Lin, Changsha Ma, Rex Shang, Howie Xu, Bryan Lee, Martin Walter, Deepen Desai, Nirmal Singh, Narinder Paul, Shashank Gupta
  • Publication number: 20210049413
    Abstract: Systems and methods include receiving content for classification; classifying the content as one of benign and malicious utilizing a model that has been trained with a training set of data including benign data and malicious data; determining a first pattern associated with the content; comparing the first pattern with a second pattern that is associated with one of the benign data and the malicious data; and determining an uncertainty of the classifying based on a distance between the first pattern and the second pattern. The systems and methods can include discarding the classification if the distance is greater than a configurable threshold.
    Type: Application
    Filed: August 16, 2019
    Publication date: February 18, 2021
    Inventors: Changsha Ma, Dianhuan Lin, Rex Shang, Kevin Guo, Howie Xu
  • Publication number: 20210004726
    Abstract: Systems and methods include training a machine learning model with data for identifying features in monitored traffic in a network; analyzing the trained machine learning model to identify information overhead therein, wherein the information overhead is utilized in part for the training; removing the information overhead in the machine learning model; and providing the machine learning model for runtime use for identifying the features in the monitored traffic, with the removed information overhead from the machine learning model.
    Type: Application
    Filed: September 18, 2020
    Publication date: January 7, 2021
    Inventors: Rex Shang, Dianhuan Lin, Changsha Ma, Douglas A. Koch, Shashank Gupta, Parnit Sainion, Visvanathan Thothathri, Narinder Paul, Howie Xu
  • Publication number: 20200320438
    Abstract: Systems and methods include receiving a content item between a user device and a location on the Internet or an enterprise network; utilizing a trained machine learning ensemble model to determine whether the content item is malicious; responsive to the trained machine learning ensemble model determining the content item is malicious or determining the content item is benign but such determining is in a blind spot of the trained ensemble model, performing further processing on the content item; and, responsive to the trained machine learning ensemble model determining the content item is benign with such determination not in a blind spot of the trained machine learning ensemble model, allowing the content item. A blind spot is a location where the trained machine learning ensemble model has not seen any examples with a combination of features at the location or has examples with conflicting labels.
    Type: Application
    Filed: April 5, 2019
    Publication date: October 8, 2020
    Inventors: Dianhuan Lin, Rex Shang, Changsha Ma, Kevin Guo, Howie Xu
  • Publication number: 20200320192
    Abstract: Systems and methods include obtaining a file associated with a user for processing; utilizing a combination of policy for the user and machine learning to determine whether to i) quarantine the file and scan the file in a sandbox, ii) allow the file to the user and scan the file in the sandbox, and iii) allow the file to the user without the scan; responsive to the quarantine of the file and the sandbox determining the file is malicious, blocking the file; and, responsive to the quarantine of the file and the sandbox determining the file is benign, allowing the file.
    Type: Application
    Filed: June 16, 2020
    Publication date: October 8, 2020
    Inventors: Changsha Ma, Rex Shang, Douglas A. Koch, Dianhuan Lin, Howie Xu, Bharath Kumar, Shashank Gupta, Parnit Sainion, Narinder Paul, Deepen Desai
  • Patent number: 9110728
    Abstract: Embodiments monitor application performance metrics representing the performance of a software application executed by one or more host computing devices. Based on the application of rules to the application performance metrics, an elasticity action, such as a power-on action, a power-off action, a deploy action, and/or a destroy action, is determined. The elasticity action is transmitted to one or more target hosts, which perform the elasticity action. The target host may be selected based on host performance metrics. Further, a load balancing service may accommodate the addition of a new software application instance to a cluster and/or the removal of an existing software application instance from the cluster.
    Type: Grant
    Filed: January 31, 2012
    Date of Patent: August 18, 2015
    Assignee: VMware, Inc.
    Inventors: Jianjun Shen, Ying He, Hailing Xu, Howie Xu, Juntao Liu, Shudong Zhou
  • Publication number: 20130198319
    Abstract: Embodiments monitor application performance metrics representing the performance of a software application executed by one or more host computing devices. Based on the application of rules to the application performance metrics, an elasticity action, such as a power-on action, a power-off action, a deploy action, and/or a destroy action, is determined. The elasticity action is transmitted to one or more target hosts, which perform the elasticity action. The target host may be selected based on host performance metrics. Further, a load balancing service may accommodate the addition of a new software application instance to a cluster and/or the removal of an existing software application instance from the cluster.
    Type: Application
    Filed: January 31, 2012
    Publication date: August 1, 2013
    Applicant: VMWARE, INC.
    Inventors: Jianjun SHEN, Ying HE, Hailing XU, Howie XU, Juntao LIU, Shudong ZHOU