Patents by Inventor Liuyang Lily Yang

Liuyang Lily Yang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11902785
    Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed to detect attacks in V2X networks. An example apparatus includes a challenge handler to (a) transmit a first challenge packet to a first vehicle to request a transmission of a first response, (b) instruct a second challenge packet to be transmitted to a second vehicle to request a transmission of a second response, (c) increment a first counter when the first response is not obtained, (d) increment a second counter when the second response is not obtained, and (e) after repeating (a)-(d), determine that the first and second vehicles are phantom vehicles associated with an attacker with a half-duplex radio when at least one of the first or second counters satisfy a threshold, and a network interface to instruct a third vehicle associated with the V2X network to ignore future messages from the phantom vehicles based on the determination.
    Type: Grant
    Filed: December 8, 2021
    Date of Patent: February 13, 2024
    Assignee: Intel Corporation
    Inventors: Liuyang Lily Yang, Debabani Choudhury, Sridhar Sharma, Kathiravetpillai Sivanesan, Justin Gottschlich, Zheng Zhang, Yair Yona, Xiruo Liu, Moreno Ambrosin, Kuilin Clark Chen
  • Patent number: 11863991
    Abstract: A first roadway system receives a communication from a second roadway system over a wireless channel, where the communication includes a description of a physical object within a driving environment. Characteristics of the physical object are determined based on sensors of the first roadway system. The communication is determined to contain an anomaly based on a comparison of the description of the physical object with the characteristics determined based on the sensors of the first roadway system. Misbehavior data is generated to describe the anomaly. A remedial action is initiated based on the anomaly.
    Type: Grant
    Filed: December 23, 2022
    Date of Patent: January 2, 2024
    Assignee: Intel Corporation
    Inventors: Liuyang Lily Yang, Manoj R. Sastry, Xiruo Liu, Moreno Ambrosin
  • Patent number: 11807227
    Abstract: Methods and apparatus to generate vehicle warnings are disclosed. An example apparatus includes a sensor to detect a vehicle, where the sensor is associated with an observer of the vehicle, an object tracker to determine a motion of the vehicle, an accident estimator to calculate a likelihood of a collision of the vehicle based on the determined motion, and a transceiver to transmit a message to the vehicle upon the likelihood of the collision exceeding a threshold, where the message includes information pertaining to the collision.
    Type: Grant
    Filed: April 30, 2019
    Date of Patent: November 7, 2023
    Assignee: Intel Corporation
    Inventors: Sridhar Sharma, Patrick Mead, Ignacio Alvarez, Kathiravetpillai Sivanesan, Justin Gottschlich, Shahab Layeghi, Liuyang Lily Yang
  • Patent number: 11792844
    Abstract: Various systems and methods for implementing random access channel security are described herein. An apparatus for a base station includes: receiver circuitry to receive at the base station, a signal from a user equipment (UE) transmitter to access resources of the base station; statistics circuitry to calculate high-order statistics on the signal to produce an identification indication; a memory device to store the high-order statistics and the identification indication; and processing circuitry to: associate the identification indication with the UE transmitter; use the identification indication to determine that multiple failures of a random access channel (RACH) process have occurred from the UE transmitter; and restrict later attempts by the UE transmitter to perform RACH processes with the base station.
    Type: Grant
    Filed: September 23, 2021
    Date of Patent: October 17, 2023
    Assignee: Intel Corporation
    Inventors: Rath Vannithamby, Kathiravetpillai Sivanesan, Liuyang Lily Yang, Christian Maciocco
  • Publication number: 20230284029
    Abstract: A first roadway system receives a communication from a second roadway system over a wireless channel, where the communication includes a description of a physical object within a driving environment. Characteristics of the physical object are determined based on sensors of the first roadway system. The communication is determined to contain an anomaly based on a comparison of the description of the physical object with the characteristics determined based on the sensors of the first roadway system. Misbehavior data is generated to describe the anomaly. A remedial action is initiated based on the anomaly.
    Type: Application
    Filed: December 23, 2022
    Publication date: September 7, 2023
    Applicant: Intel Corporation
    Inventors: Liuyang Lily Yang, Manoj R. Sastry, Xiruo Liu, Moreno Ambrosin
  • Publication number: 20230188982
    Abstract: A non-transitory computer-readable storage medium stores instructions to configure a base station for user equipment (UE) authentication in a wireless network and to cause the base station to perform an operation comprising decoding configuration signaling received from a PHY security function (PSF) of the wireless network. The configuration signaling includes a request for collection of a plurality of signal samples from the UE, the UE authenticated based on successful completion of a first authentication process. A response message is encoded for transmission to the PSF. The response message includes the plurality of UE signal samples. A trained machine learning model received from the PSF is decoded. The trained machine learning model associates the authenticated UE with an RF signature of the UE. The RF signature is based on the plurality of signal samples. A second authentication process of the UE is performed based on the trained model.
    Type: Application
    Filed: December 14, 2021
    Publication date: June 15, 2023
    Inventors: Kathiravetpillai Sivanesan, Liuyang Lily Yang, Rath Vannithamby, Christian Maciocco
  • Publication number: 20230095401
    Abstract: An apparatus and system to mitigate non-genuine handovers are described. The handovers include handovers based on fake measurements and handovers to malicious cells. To mitigate these, a mitigation procedure is initiated when excessive handovers are detected. Location information obtained from the UE, estimation of PHY layer properties by the serving and/or target cell, or AI modeling of the best serving cell at the UE location is used to determine whether the handover is valid. If not, the handover is canceled and the UE is stopped from initiating new handovers for a specified time, the UE may be instructed to perform re-authentication with the network, and/or the serving cell recommends to the network authentication entity to revoke the UE authentication. To ensure that the target cell is legitimate, an AI model is used to classify the target cell as known/unknown and the result sent to the network in NAS signaling.
    Type: Application
    Filed: September 24, 2021
    Publication date: March 30, 2023
    Inventors: Kathiravetpillai Sivanesan, Christian Maciocco, Rath Vannithamby, Liuyang Lily Yang
  • Publication number: 20230086899
    Abstract: A computing node includes interface circuitry and processing circuitry. To implement a spectrum harvesting entity in a wireless network configured for crowdsource-based unlicensed spectrum harvesting, the processing circuitry is configured to select a set of crowdsourcing nodes from a plurality of crowdsourcing nodes available in the wireless network. A plurality of spectrum occupancy reports (SORs) is received from the set of crowdsourcing. Each of the plurality of SORs indicates a channel occupancy status of a communication channel in the unlicensed spectrum sensed by a corresponding crowdsourcing node of the set and geolocation associated with the corresponding crowdsourcing node. A spectrum occupancy map of the unlicensed spectrum is generated based on the channel occupancy status and the geolocation provided in the plurality of SORs by each crowdsourcing node of the set of crowdsourcing nodes.
    Type: Application
    Filed: September 23, 2021
    Publication date: March 23, 2023
    Inventors: Vesh Raj Sharma Banjade, S M Iftekharul Alam, Kuilin Clark Chen, Kshitij Arun Doshi, Francesc Guim Bernat, Christian Maciocco, Ned M. Smith, Liuyang Lily Yang, Satish Chandra Jha
  • Publication number: 20230013452
    Abstract: System and techniques for an environmental control loop are described herein. A device for an environmental control loop can include a memory including instructions and processing circuitry that when in operation, can be configured by the instructions to receive environmental sensor data from a first component in a set of heterogeneous components installed in an environment with a controller. The environmental sensor data can indicate a service level value sensed by the first component. The controller can also measure a violation of a service level objective based on comparing the environmental sensor data to a threshold. The controller can also transmit an adjustment to an operating parameter of a second component of the set of heterogeneous components. The adjustment can be operative to attenuate the violation of the service level objective when implemented by the second component.
    Type: Application
    Filed: September 27, 2022
    Publication date: January 19, 2023
    Inventors: S M Iftekharul Alam, Marcos E. Carranza, Francesc Guim Bernat, Mateo Guzman, Satish Chandra Jha, Cesar Martinez-Spessot, Arvind Merwaday, Rajesh Poornachandran, Vesh Raj Sharma Banjade, Kathiravetpillai Sivanesan, Ned M. Smith, Liuyang Lily Yang, Mario Jose Divan Koller
  • Patent number: 11553346
    Abstract: A first roadway system receives a communication from a second roadway system over a wireless channel, where the communication includes a description of a physical object within a driving environment. Characteristics of the physical object are determined based on sensors of the first roadway system. The communication is determined to contain an anomaly based on a comparison of the description of the physical object with the characteristics determined based on the sensors of the first roadway system. Misbehavior data is generated to describe the anomaly. A remedial action is initiated based on the anomaly.
    Type: Grant
    Filed: December 27, 2019
    Date of Patent: January 10, 2023
    Assignee: Intel Corporation
    Inventors: Liuyang Lily Yang, Manoj R. Sastry, Xiruo Liu, Moreno Ambrosin
  • Patent number: 11520331
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed that provide an apparatus to analyze vehicle perspectives, the apparatus comprising a profile generator to generate a first profile of an environment based on a profile template and first data generated by a first vehicle; a data analyzer to: determine a difference between the first profile and a second profile obtained from a first one of one or more nodes in the environment; and in response to a trigger event, update the first profile based on the difference; and a vehicle control system to: in response to the trigger event, update a first perspective of the environment based on one or more of second data from the first one of the one or more nodes or the updated first profile; update a path plan for the first vehicle based on the updated first perspective; and execute the updated path plan.
    Type: Grant
    Filed: December 28, 2018
    Date of Patent: December 6, 2022
    Assignee: Intel Corporation
    Inventors: Sara Baghsorkhi, Justin Gottschlich, Alexander Heinecke, Mohammad Mejbah Ul Alam, Shengtian Zhou, Sridhar Sharma, Patrick Andrew Mead, Ignacio Alvarez, David Gonzalez Aguirre, Kathiravetpillai Sivanesan, Jeffrey Ota, Jason Martin, Liuyang Lily Yang
  • Patent number: 11490249
    Abstract: Systems and techniques for securing vehicle privacy in a driving infrastructure are described herein. A vehicle may contact a group identification (ID) issuer to register itself. A group ID may be received from the group ID issuer to indicate acceptance as a member. The vehicle may then contact the driving infrastructure to attach to the driving infrastructure using the group ID to identify the vehicle. In response, the vehicle receives an attachment ID from the driving infrastructure. Here, the attachment ID is used to secure communications between the vehicle and the driving infrastructure.
    Type: Grant
    Filed: September 27, 2019
    Date of Patent: November 1, 2022
    Assignee: Intel Corporation
    Inventors: Rafael Rosales, Liuyang Lily Yang, Xiruo Liu
  • Patent number: 11423162
    Abstract: A vehicle control system, including an in-vehicle bus and a plurality of electronic control units (ECUs) coupled to the in-vehicle bus, wherein at least one ECU of the plurality of ECUs is configured to: receive, at a respective at least one ECU of the plurality of ECUs, a message in a message stream on the in-vehicle bus; evaluate the message to determine at least one of a confidence value of the security classification, a significance value of the message, or a bounds check value of the message; and determine in real-time to allow or deny the message to the vehicle control system based on at least one of the significance value of the message, the bounds check value of the message, or the confidence value of the security classification of the message, to provide a sanitized message stream to the vehicle control system.
    Type: Grant
    Filed: March 27, 2020
    Date of Patent: August 23, 2022
    Assignee: INTEL CORPORATION
    Inventors: Marcio Juliato, Shabbir Ahmed, Maria Soledad Elli, Christopher Noe Gutierrez, Vuk Lesi, Manoj R. Sastry, John Charles Weast, Liuyang Lily Yang
  • Publication number: 20220240168
    Abstract: A computing node to implement a management entity in a CP-based network. The node including processing circuitry configured to encode an inquiry message requesting information on CPS capabilities. Response messages are received from a set of sensing nodes of a plurality of sensing nodes in response to the inquiry message. The response messages include the information on the CPS capabilities of the set of sensing nodes. A notification message indicating selecting of a sensing node as a sensing coordinator is encoded for transmission. Sensed data received in a broadcast message from the sensing coordinator is decoded. The sensed data including data associated with one or more non-V2X capable sensing nodes.
    Type: Application
    Filed: September 23, 2021
    Publication date: July 28, 2022
    Inventors: Vallabhajosyula S. Somayazulu, Rath Vannithamby, Kathiravetpillai Sivanesan, Markus Dominik Mueck, Leonardo Gomes Baltar, Marcio Rogerio Juliato, Liuyang Lily Yang, Manoj R. Sastry, Shabbir Ahmed, Christopher Gutierrez, Vuk Lesi, Qian Wang
  • Publication number: 20220225227
    Abstract: System and techniques for network slice resiliency are described herein. An indication of a fault-attack-failure-outage (FAFO) event for a network slice may be received. Here, the network slice is one of multiple network slices. A capacity in a slice segment may be estimated to determine whether there is enough capacity to meet a service level agreement (SLA) of the multiple network slices based on the FAFO event. In this case, the slice segment is a set of physical resources shared by the multiple network slices. Operation of the slice segment may then be modified based on results from estimating the capacity in the slice segment to address impacts from the FAFO event.
    Type: Application
    Filed: April 1, 2022
    Publication date: July 14, 2022
    Inventors: Satish Chandra Jha, S M Iftekharul Alam, Vesh Raj Sharma Banjade, Ned M. Smith, Arvind Merwaday, Kshitij Arun Doshi, Francesc Guim Bernat, Liuyang Lily Yang, Kuilin Clark Chen, Christian Maciocco, Marcio Rogerio Juliato, Maruti Gupta Hyde, Manoj R. Sastry
  • Publication number: 20220191648
    Abstract: Systems and techniques for digital twin framework for next generation networks are described herein. A digital twin model may be generated for physical nodes of an edge network. The digital twin model may include a digital twin for a physical node of the physical nodes. An error may be identified of the physical node or the digital twin for the physical node. The digital twin model may be updated to halt communication with the physical node or the digital twin of the physical node. A path may be created to another physical node or a digital twin of the another physical node in the digital twin model.
    Type: Application
    Filed: December 20, 2021
    Publication date: June 16, 2022
    Inventors: Ned M. Smith, S M Iftekharul Alam, Vesh Raj Sharma Banjade, Satish Chandra Jha, Liuyang Lily Yang, Christian Maciocco, Nageen Himayat, Arvind Merwaday, Francesc Guim Bernat, Kshitij Arun Doshi
  • Publication number: 20220124503
    Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed to detect attacks in V2X networks. An example apparatus includes a challenge handler to (a) transmit a first challenge packet to a first vehicle to request a transmission of a first response, (b) instruct a second challenge packet to be transmitted to a second vehicle to request a transmission of a second response, (c) increment a first counter when the first response is not obtained, (d) increment a second counter when the second response is not obtained, and (e) after repeating (a)-(d), determine that the first and second vehicles are phantom vehicles associated with an attacker with a half-duplex radio when at least one of the first or second counters satisfy a threshold, and a network interface to instruct a third vehicle associated with the V2X network to ignore future messages from the phantom vehicles based on the determination.
    Type: Application
    Filed: December 8, 2021
    Publication date: April 21, 2022
    Inventors: Liuyang Lily Yang, Debabani Choudhury, Sridhar Sharma, Kathiravetpillai Sivanesan, Justin Gottschlich, Zheng Zhang, Yair Yona, Xiruo Liu, Moreno Ambrosin, Kuilin Clark Chen
  • Publication number: 20220116335
    Abstract: A computing node includes network interface circuitry and processing circuitry. The processing circuitry assigns available computing resources to a plurality of slice contexts. Each slice context of the plurality includes resource allocations of the available computing resources associated with multiple communication networks. A first portion of the resource allocations is designated as dedicated resources and a second, remaining portion is designated as shared resources. A FAFO event associated with a workload is detected. The workload executes on a network slice instance (NSI) associated with a slice context of a subset of slice contexts. The configuration of the NSI is restored to a pre-FAFO event state based on reconfiguring one or both of the dedicated resources or the shared resources of the slice context based on the resource allocations of at least a second slice context in the subset of slice contexts.
    Type: Application
    Filed: December 21, 2021
    Publication date: April 14, 2022
    Inventors: Vesh Raj Sharma Banjade, Satish Chandra Jha, Ned M. Smith, S M Iftekharul Alam, Christian Maciocco, Liuyang Lily Yang, Mona Vij, Kshitij Arun Doshi, Francesc Guim Bernat, Clark Chen
  • Patent number: 11252567
    Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed to detect attacks in V2X networks. An example apparatus includes a challenge handler to (a) transmit a first challenge packet to a first vehicle to request a transmission of a first response, (b) instruct a second challenge packet to be transmitted to a second vehicle to request a transmission of a second response, (c) increment a first counter when the first response is not obtained, (d) increment a second counter when the second response is not obtained, and (e) after repeating (a)-(d), determine that the first and second vehicles are phantom vehicles associated with an attacker with a half-duplex radio when at least one of the first or second counters satisfy a threshold, and a network interface to instruct a third vehicle associated with the V2X network to ignore future messages from the phantom vehicles based on the determination.
    Type: Grant
    Filed: December 21, 2018
    Date of Patent: February 15, 2022
    Assignee: Intel Corporation
    Inventors: Liuyang Lily Yang, Debabani Choudhury, Sridhar Sharma, Kathiravetpillai Sivanesan, Justin Gottschlich, Zheng Zhang, Yair Yona, Xiruo Liu, Moreno Ambrosin, Kuilin Clark Chen
  • Publication number: 20220015140
    Abstract: Various systems and methods for implementing random access channel security are described herein. An apparatus for a base station includes: receiver circuitry to receive at the base station, a signal from a user equipment (UE) transmitter to access resources of the base station; statistics circuitry to calculate high-order statistics on the signal to produce an identification indication; a memory device to store the high-order statistics and the identification indication; and processing circuitry to: associate the identification indication with the UE transmitter; use the identification indication to determine that multiple failures of a random access channel (RACH) process have occurred from the UE transmitter; and restrict later attempts by the UE transmitter to perform RACH processes with the base station.
    Type: Application
    Filed: September 23, 2021
    Publication date: January 13, 2022
    Inventors: Rath Vannithamby, Kathiravetpillai Sivanesan, Liuyang Lily Yang, Christian Maciocco