Patents by Inventor Liuyang Lily Yang
Liuyang Lily Yang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11902785Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed to detect attacks in V2X networks. An example apparatus includes a challenge handler to (a) transmit a first challenge packet to a first vehicle to request a transmission of a first response, (b) instruct a second challenge packet to be transmitted to a second vehicle to request a transmission of a second response, (c) increment a first counter when the first response is not obtained, (d) increment a second counter when the second response is not obtained, and (e) after repeating (a)-(d), determine that the first and second vehicles are phantom vehicles associated with an attacker with a half-duplex radio when at least one of the first or second counters satisfy a threshold, and a network interface to instruct a third vehicle associated with the V2X network to ignore future messages from the phantom vehicles based on the determination.Type: GrantFiled: December 8, 2021Date of Patent: February 13, 2024Assignee: Intel CorporationInventors: Liuyang Lily Yang, Debabani Choudhury, Sridhar Sharma, Kathiravetpillai Sivanesan, Justin Gottschlich, Zheng Zhang, Yair Yona, Xiruo Liu, Moreno Ambrosin, Kuilin Clark Chen
-
Patent number: 11863991Abstract: A first roadway system receives a communication from a second roadway system over a wireless channel, where the communication includes a description of a physical object within a driving environment. Characteristics of the physical object are determined based on sensors of the first roadway system. The communication is determined to contain an anomaly based on a comparison of the description of the physical object with the characteristics determined based on the sensors of the first roadway system. Misbehavior data is generated to describe the anomaly. A remedial action is initiated based on the anomaly.Type: GrantFiled: December 23, 2022Date of Patent: January 2, 2024Assignee: Intel CorporationInventors: Liuyang Lily Yang, Manoj R. Sastry, Xiruo Liu, Moreno Ambrosin
-
Patent number: 11807227Abstract: Methods and apparatus to generate vehicle warnings are disclosed. An example apparatus includes a sensor to detect a vehicle, where the sensor is associated with an observer of the vehicle, an object tracker to determine a motion of the vehicle, an accident estimator to calculate a likelihood of a collision of the vehicle based on the determined motion, and a transceiver to transmit a message to the vehicle upon the likelihood of the collision exceeding a threshold, where the message includes information pertaining to the collision.Type: GrantFiled: April 30, 2019Date of Patent: November 7, 2023Assignee: Intel CorporationInventors: Sridhar Sharma, Patrick Mead, Ignacio Alvarez, Kathiravetpillai Sivanesan, Justin Gottschlich, Shahab Layeghi, Liuyang Lily Yang
-
Patent number: 11792844Abstract: Various systems and methods for implementing random access channel security are described herein. An apparatus for a base station includes: receiver circuitry to receive at the base station, a signal from a user equipment (UE) transmitter to access resources of the base station; statistics circuitry to calculate high-order statistics on the signal to produce an identification indication; a memory device to store the high-order statistics and the identification indication; and processing circuitry to: associate the identification indication with the UE transmitter; use the identification indication to determine that multiple failures of a random access channel (RACH) process have occurred from the UE transmitter; and restrict later attempts by the UE transmitter to perform RACH processes with the base station.Type: GrantFiled: September 23, 2021Date of Patent: October 17, 2023Assignee: Intel CorporationInventors: Rath Vannithamby, Kathiravetpillai Sivanesan, Liuyang Lily Yang, Christian Maciocco
-
Publication number: 20230284029Abstract: A first roadway system receives a communication from a second roadway system over a wireless channel, where the communication includes a description of a physical object within a driving environment. Characteristics of the physical object are determined based on sensors of the first roadway system. The communication is determined to contain an anomaly based on a comparison of the description of the physical object with the characteristics determined based on the sensors of the first roadway system. Misbehavior data is generated to describe the anomaly. A remedial action is initiated based on the anomaly.Type: ApplicationFiled: December 23, 2022Publication date: September 7, 2023Applicant: Intel CorporationInventors: Liuyang Lily Yang, Manoj R. Sastry, Xiruo Liu, Moreno Ambrosin
-
Publication number: 20230188982Abstract: A non-transitory computer-readable storage medium stores instructions to configure a base station for user equipment (UE) authentication in a wireless network and to cause the base station to perform an operation comprising decoding configuration signaling received from a PHY security function (PSF) of the wireless network. The configuration signaling includes a request for collection of a plurality of signal samples from the UE, the UE authenticated based on successful completion of a first authentication process. A response message is encoded for transmission to the PSF. The response message includes the plurality of UE signal samples. A trained machine learning model received from the PSF is decoded. The trained machine learning model associates the authenticated UE with an RF signature of the UE. The RF signature is based on the plurality of signal samples. A second authentication process of the UE is performed based on the trained model.Type: ApplicationFiled: December 14, 2021Publication date: June 15, 2023Inventors: Kathiravetpillai Sivanesan, Liuyang Lily Yang, Rath Vannithamby, Christian Maciocco
-
Publication number: 20230095401Abstract: An apparatus and system to mitigate non-genuine handovers are described. The handovers include handovers based on fake measurements and handovers to malicious cells. To mitigate these, a mitigation procedure is initiated when excessive handovers are detected. Location information obtained from the UE, estimation of PHY layer properties by the serving and/or target cell, or AI modeling of the best serving cell at the UE location is used to determine whether the handover is valid. If not, the handover is canceled and the UE is stopped from initiating new handovers for a specified time, the UE may be instructed to perform re-authentication with the network, and/or the serving cell recommends to the network authentication entity to revoke the UE authentication. To ensure that the target cell is legitimate, an AI model is used to classify the target cell as known/unknown and the result sent to the network in NAS signaling.Type: ApplicationFiled: September 24, 2021Publication date: March 30, 2023Inventors: Kathiravetpillai Sivanesan, Christian Maciocco, Rath Vannithamby, Liuyang Lily Yang
-
Publication number: 20230086899Abstract: A computing node includes interface circuitry and processing circuitry. To implement a spectrum harvesting entity in a wireless network configured for crowdsource-based unlicensed spectrum harvesting, the processing circuitry is configured to select a set of crowdsourcing nodes from a plurality of crowdsourcing nodes available in the wireless network. A plurality of spectrum occupancy reports (SORs) is received from the set of crowdsourcing. Each of the plurality of SORs indicates a channel occupancy status of a communication channel in the unlicensed spectrum sensed by a corresponding crowdsourcing node of the set and geolocation associated with the corresponding crowdsourcing node. A spectrum occupancy map of the unlicensed spectrum is generated based on the channel occupancy status and the geolocation provided in the plurality of SORs by each crowdsourcing node of the set of crowdsourcing nodes.Type: ApplicationFiled: September 23, 2021Publication date: March 23, 2023Inventors: Vesh Raj Sharma Banjade, S M Iftekharul Alam, Kuilin Clark Chen, Kshitij Arun Doshi, Francesc Guim Bernat, Christian Maciocco, Ned M. Smith, Liuyang Lily Yang, Satish Chandra Jha
-
Publication number: 20230013452Abstract: System and techniques for an environmental control loop are described herein. A device for an environmental control loop can include a memory including instructions and processing circuitry that when in operation, can be configured by the instructions to receive environmental sensor data from a first component in a set of heterogeneous components installed in an environment with a controller. The environmental sensor data can indicate a service level value sensed by the first component. The controller can also measure a violation of a service level objective based on comparing the environmental sensor data to a threshold. The controller can also transmit an adjustment to an operating parameter of a second component of the set of heterogeneous components. The adjustment can be operative to attenuate the violation of the service level objective when implemented by the second component.Type: ApplicationFiled: September 27, 2022Publication date: January 19, 2023Inventors: S M Iftekharul Alam, Marcos E. Carranza, Francesc Guim Bernat, Mateo Guzman, Satish Chandra Jha, Cesar Martinez-Spessot, Arvind Merwaday, Rajesh Poornachandran, Vesh Raj Sharma Banjade, Kathiravetpillai Sivanesan, Ned M. Smith, Liuyang Lily Yang, Mario Jose Divan Koller
-
Patent number: 11553346Abstract: A first roadway system receives a communication from a second roadway system over a wireless channel, where the communication includes a description of a physical object within a driving environment. Characteristics of the physical object are determined based on sensors of the first roadway system. The communication is determined to contain an anomaly based on a comparison of the description of the physical object with the characteristics determined based on the sensors of the first roadway system. Misbehavior data is generated to describe the anomaly. A remedial action is initiated based on the anomaly.Type: GrantFiled: December 27, 2019Date of Patent: January 10, 2023Assignee: Intel CorporationInventors: Liuyang Lily Yang, Manoj R. Sastry, Xiruo Liu, Moreno Ambrosin
-
Patent number: 11520331Abstract: Methods, apparatus, systems and articles of manufacture are disclosed that provide an apparatus to analyze vehicle perspectives, the apparatus comprising a profile generator to generate a first profile of an environment based on a profile template and first data generated by a first vehicle; a data analyzer to: determine a difference between the first profile and a second profile obtained from a first one of one or more nodes in the environment; and in response to a trigger event, update the first profile based on the difference; and a vehicle control system to: in response to the trigger event, update a first perspective of the environment based on one or more of second data from the first one of the one or more nodes or the updated first profile; update a path plan for the first vehicle based on the updated first perspective; and execute the updated path plan.Type: GrantFiled: December 28, 2018Date of Patent: December 6, 2022Assignee: Intel CorporationInventors: Sara Baghsorkhi, Justin Gottschlich, Alexander Heinecke, Mohammad Mejbah Ul Alam, Shengtian Zhou, Sridhar Sharma, Patrick Andrew Mead, Ignacio Alvarez, David Gonzalez Aguirre, Kathiravetpillai Sivanesan, Jeffrey Ota, Jason Martin, Liuyang Lily Yang
-
Patent number: 11490249Abstract: Systems and techniques for securing vehicle privacy in a driving infrastructure are described herein. A vehicle may contact a group identification (ID) issuer to register itself. A group ID may be received from the group ID issuer to indicate acceptance as a member. The vehicle may then contact the driving infrastructure to attach to the driving infrastructure using the group ID to identify the vehicle. In response, the vehicle receives an attachment ID from the driving infrastructure. Here, the attachment ID is used to secure communications between the vehicle and the driving infrastructure.Type: GrantFiled: September 27, 2019Date of Patent: November 1, 2022Assignee: Intel CorporationInventors: Rafael Rosales, Liuyang Lily Yang, Xiruo Liu
-
Patent number: 11423162Abstract: A vehicle control system, including an in-vehicle bus and a plurality of electronic control units (ECUs) coupled to the in-vehicle bus, wherein at least one ECU of the plurality of ECUs is configured to: receive, at a respective at least one ECU of the plurality of ECUs, a message in a message stream on the in-vehicle bus; evaluate the message to determine at least one of a confidence value of the security classification, a significance value of the message, or a bounds check value of the message; and determine in real-time to allow or deny the message to the vehicle control system based on at least one of the significance value of the message, the bounds check value of the message, or the confidence value of the security classification of the message, to provide a sanitized message stream to the vehicle control system.Type: GrantFiled: March 27, 2020Date of Patent: August 23, 2022Assignee: INTEL CORPORATIONInventors: Marcio Juliato, Shabbir Ahmed, Maria Soledad Elli, Christopher Noe Gutierrez, Vuk Lesi, Manoj R. Sastry, John Charles Weast, Liuyang Lily Yang
-
Publication number: 20220240168Abstract: A computing node to implement a management entity in a CP-based network. The node including processing circuitry configured to encode an inquiry message requesting information on CPS capabilities. Response messages are received from a set of sensing nodes of a plurality of sensing nodes in response to the inquiry message. The response messages include the information on the CPS capabilities of the set of sensing nodes. A notification message indicating selecting of a sensing node as a sensing coordinator is encoded for transmission. Sensed data received in a broadcast message from the sensing coordinator is decoded. The sensed data including data associated with one or more non-V2X capable sensing nodes.Type: ApplicationFiled: September 23, 2021Publication date: July 28, 2022Inventors: Vallabhajosyula S. Somayazulu, Rath Vannithamby, Kathiravetpillai Sivanesan, Markus Dominik Mueck, Leonardo Gomes Baltar, Marcio Rogerio Juliato, Liuyang Lily Yang, Manoj R. Sastry, Shabbir Ahmed, Christopher Gutierrez, Vuk Lesi, Qian Wang
-
Publication number: 20220225227Abstract: System and techniques for network slice resiliency are described herein. An indication of a fault-attack-failure-outage (FAFO) event for a network slice may be received. Here, the network slice is one of multiple network slices. A capacity in a slice segment may be estimated to determine whether there is enough capacity to meet a service level agreement (SLA) of the multiple network slices based on the FAFO event. In this case, the slice segment is a set of physical resources shared by the multiple network slices. Operation of the slice segment may then be modified based on results from estimating the capacity in the slice segment to address impacts from the FAFO event.Type: ApplicationFiled: April 1, 2022Publication date: July 14, 2022Inventors: Satish Chandra Jha, S M Iftekharul Alam, Vesh Raj Sharma Banjade, Ned M. Smith, Arvind Merwaday, Kshitij Arun Doshi, Francesc Guim Bernat, Liuyang Lily Yang, Kuilin Clark Chen, Christian Maciocco, Marcio Rogerio Juliato, Maruti Gupta Hyde, Manoj R. Sastry
-
Publication number: 20220191648Abstract: Systems and techniques for digital twin framework for next generation networks are described herein. A digital twin model may be generated for physical nodes of an edge network. The digital twin model may include a digital twin for a physical node of the physical nodes. An error may be identified of the physical node or the digital twin for the physical node. The digital twin model may be updated to halt communication with the physical node or the digital twin of the physical node. A path may be created to another physical node or a digital twin of the another physical node in the digital twin model.Type: ApplicationFiled: December 20, 2021Publication date: June 16, 2022Inventors: Ned M. Smith, S M Iftekharul Alam, Vesh Raj Sharma Banjade, Satish Chandra Jha, Liuyang Lily Yang, Christian Maciocco, Nageen Himayat, Arvind Merwaday, Francesc Guim Bernat, Kshitij Arun Doshi
-
Publication number: 20220124503Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed to detect attacks in V2X networks. An example apparatus includes a challenge handler to (a) transmit a first challenge packet to a first vehicle to request a transmission of a first response, (b) instruct a second challenge packet to be transmitted to a second vehicle to request a transmission of a second response, (c) increment a first counter when the first response is not obtained, (d) increment a second counter when the second response is not obtained, and (e) after repeating (a)-(d), determine that the first and second vehicles are phantom vehicles associated with an attacker with a half-duplex radio when at least one of the first or second counters satisfy a threshold, and a network interface to instruct a third vehicle associated with the V2X network to ignore future messages from the phantom vehicles based on the determination.Type: ApplicationFiled: December 8, 2021Publication date: April 21, 2022Inventors: Liuyang Lily Yang, Debabani Choudhury, Sridhar Sharma, Kathiravetpillai Sivanesan, Justin Gottschlich, Zheng Zhang, Yair Yona, Xiruo Liu, Moreno Ambrosin, Kuilin Clark Chen
-
Publication number: 20220116335Abstract: A computing node includes network interface circuitry and processing circuitry. The processing circuitry assigns available computing resources to a plurality of slice contexts. Each slice context of the plurality includes resource allocations of the available computing resources associated with multiple communication networks. A first portion of the resource allocations is designated as dedicated resources and a second, remaining portion is designated as shared resources. A FAFO event associated with a workload is detected. The workload executes on a network slice instance (NSI) associated with a slice context of a subset of slice contexts. The configuration of the NSI is restored to a pre-FAFO event state based on reconfiguring one or both of the dedicated resources or the shared resources of the slice context based on the resource allocations of at least a second slice context in the subset of slice contexts.Type: ApplicationFiled: December 21, 2021Publication date: April 14, 2022Inventors: Vesh Raj Sharma Banjade, Satish Chandra Jha, Ned M. Smith, S M Iftekharul Alam, Christian Maciocco, Liuyang Lily Yang, Mona Vij, Kshitij Arun Doshi, Francesc Guim Bernat, Clark Chen
-
Patent number: 11252567Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed to detect attacks in V2X networks. An example apparatus includes a challenge handler to (a) transmit a first challenge packet to a first vehicle to request a transmission of a first response, (b) instruct a second challenge packet to be transmitted to a second vehicle to request a transmission of a second response, (c) increment a first counter when the first response is not obtained, (d) increment a second counter when the second response is not obtained, and (e) after repeating (a)-(d), determine that the first and second vehicles are phantom vehicles associated with an attacker with a half-duplex radio when at least one of the first or second counters satisfy a threshold, and a network interface to instruct a third vehicle associated with the V2X network to ignore future messages from the phantom vehicles based on the determination.Type: GrantFiled: December 21, 2018Date of Patent: February 15, 2022Assignee: Intel CorporationInventors: Liuyang Lily Yang, Debabani Choudhury, Sridhar Sharma, Kathiravetpillai Sivanesan, Justin Gottschlich, Zheng Zhang, Yair Yona, Xiruo Liu, Moreno Ambrosin, Kuilin Clark Chen
-
Publication number: 20220015140Abstract: Various systems and methods for implementing random access channel security are described herein. An apparatus for a base station includes: receiver circuitry to receive at the base station, a signal from a user equipment (UE) transmitter to access resources of the base station; statistics circuitry to calculate high-order statistics on the signal to produce an identification indication; a memory device to store the high-order statistics and the identification indication; and processing circuitry to: associate the identification indication with the UE transmitter; use the identification indication to determine that multiple failures of a random access channel (RACH) process have occurred from the UE transmitter; and restrict later attempts by the UE transmitter to perform RACH processes with the base station.Type: ApplicationFiled: September 23, 2021Publication date: January 13, 2022Inventors: Rath Vannithamby, Kathiravetpillai Sivanesan, Liuyang Lily Yang, Christian Maciocco