Patents by Inventor Niraj K. Jha
Niraj K. Jha has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11973771Abstract: According to various embodiments, a method for detecting security vulnerabilities in at least one of cyber-physical systems (CPSs) and Internet of Things (IoT) devices is disclosed. The method includes constructing an attack directed acyclic graph (DAG) from a plurality of regular expressions, where each regular expression corresponds to control-data flow for a known CPS/IoT attack. The method further includes performing a linear search on the attack DAG to determine unexploited CPS/IoT attack vectors, where a path in the attack DAG that does not represent a known CPS/IoT attack vector represents an unexploited CPS/IoT attack vector. The method also includes applying a trained machine learning module to the attack DAG to predict new CPS/IoT vulnerability exploits. The method further includes constructing a defense DAG configured to protect against the known CPS/IoT attacks, the unexploited CPS/IoT attacks, and the new CPS/IoT vulnerability exploits.Type: GrantFiled: February 25, 2020Date of Patent: April 30, 2024Assignee: THE TRUSTEES OF PRINCETON UNIVERSITYInventors: Tanujay Saha, Najwa Aaraj, Niraj K. Jha
-
Publication number: 20230422039Abstract: According to various embodiments, a method for detecting security vulnerabilities in a fifth generation core network (5GCN) is disclosed. The method includes constructing an attack graph from a plurality of regular expressions. Each regular expression corresponds to a sequence of system level operations for a known 5GCN attack. The method further includes performing a linear search on the attack graph to determine unexploited 5GCN attack vectors where path in the attack graph that does not represent a known 5GCN attack vector represents an unexploited 5GCN attack vector. The method also includes applying a trained machine learning module to the attack graph to predict new 5GCN attacks. The trained machine learning module is configured to determine a feasibility of linking unconnected nodes in the attack graph to create a new branch representing a new 5GCN vulnerability exploit.Type: ApplicationFiled: November 8, 2021Publication date: December 28, 2023Applicant: The Trustees of Princeton UniversityInventors: Tanujay SAHA, Niraj K. JHA, Najwa AARAJ
-
Publication number: 20230328094Abstract: According to various embodiments, a system for detecting security vulnerabilities in at least one of cyber-physical systems (CPSs) and Internet of Things (IoT) devices is disclosed. The system includes one or more processors configured to construct an attack directed acyclic graph (DAG) unique to each CPS or IoT device of the devices. The processors are further configured to generate an aggregate attack DAG from a classification of each device and a location of each device in network topology specified by a system administrator. The processors are also configured to calculate a vulnerability score and exploit risk score for each node in the aggregate attack DAG. The processors are further configured to optimize placement of defenses to reduce an adversary score of the aggregate attack DAG.Type: ApplicationFiled: September 20, 2021Publication date: October 12, 2023Applicant: The Trustees of Princeton UniversityInventors: Jacob BROWN, Tanujay SAHA, Niraj K. JHA
-
Patent number: 11783060Abstract: Devices and methods for processing detected signals at a detector using a processor are provided. The system involves (i) a data compressor that implements an algorithm for converting a set of data into a compressed set of data, (ii) a machine learning (ML) module coupled to the data compressor, the ML module transforming the compressed set of data into a vector and filtering the vector, (iii) a data encryptor coupled to the ML module that encrypts the filtered vector, and (iv) an integrity protection module coupled to the ML module, wherein the integrity protection module protects the integrity of the filtered vector.Type: GrantFiled: January 24, 2018Date of Patent: October 10, 2023Assignee: THE TRUSTEES OF PRINCETON UNIVERSITYInventor: Niraj K. Jha
-
Publication number: 20230181120Abstract: According to various embodiments, a machine-learning based system for coronavirus detection is disclosed. The system includes one or more processors configured to interact with a plurality of wearable medical sensors (WMSs). The processors are configured to receive physiological data from the WMSs and questionnaire data from a user interface. The processors are further configured to train at least one neural network based on raw physiological data and questionnaire data augmented with synthetic data and subjected to a grow-and-prune paradigm to generate at least one coronavirus inference model. The processors are also configured to output a coronavirus-based decision by inputting the received physiological data and questionnaire data into the generated coronavirus inference model.Type: ApplicationFiled: April 20, 2021Publication date: June 15, 2023Applicant: The Trustees of Princeton UniversityInventors: Shayan HASSANTABAR, Niraj K. JHA
-
Patent number: 11521068Abstract: According to various embodiments, a method for generating one or more optimal neural network architectures is disclosed. The method includes providing an initial seed neural network architecture and utilizing sequential phases to synthesize the neural network until a desired neural network architecture is reached. The phases include a gradient-based growth phase and a magnitude-based pruning phase.Type: GrantFiled: October 25, 2018Date of Patent: December 6, 2022Assignee: THE TRUSTEES OF PRINCETON UNIVERSITYInventors: Xiaoliang Dai, Hongxu Yin, Niraj K. Jha
-
Publication number: 20220240864Abstract: According to various embodiments, a machine-learning based system for diabetes analysis is disclosed. The system includes one or more processors configured to interact with a plurality of wearable medical sensors (WMSs). The processors are configured to receive physiological data from the WMSs and demographic data from a user interface. The processors are further configured to train at least one neural network based on a grow-and-prune paradigm to generate at least one diabetes inference model. The neural network grows at least one of connections and neurons based on gradient information and prunes away at least one of connections and neurons based on magnitude information. The processors are also configured to output a diabetes-based decision by inputting the received physiological data and demographic data into the generated diabetes inference model.Type: ApplicationFiled: June 16, 2020Publication date: August 4, 2022Applicant: The Trustees of Princeton UniversityInventors: Hongxu Yin, Bilal Mukadam, Xiaoliang Dai, Niraj K. Jha
-
Publication number: 20220222534Abstract: According to various embodiments, a method for generating a compact and accurate neural network for a dataset that has initial data and is updated with new data is disclosed. The method includes performing a first training on the initial neural network architecture to create a first trained neural network architecture. The method additionally includes performing a second training on the first trained neural network architecture when the dataset is updated with new data to create a second trained neural network architecture. The second training includes growing one or more connections for the new data based on a gradient of each connection, growing one or more connections for the new data and the initial data based on a gradient of each connection, and iteratively pruning one or more connections based on a magnitude of each connection until a desired neural network architecture is achieved.Type: ApplicationFiled: March 20, 2020Publication date: July 14, 2022Applicant: The Trustees of Princeton UniversityInventors: Xiaoliang DAI, Hongxu YIN, Niraj K. JHA
-
Publication number: 20220201014Abstract: According to various embodiments, a method for detecting security vulnerabilities in at least one of cyber-physical systems (CPSs) and Internet of Things (IoT) devices is disclosed. The method includes constructing an attack directed acyclic graph (DAG) from a plurality of regular expressions, where each regular expression corresponds to control-data flow for a known CPS/IoT attack. The method further includes performing a linear search on the attack DAG to determine unexploited CPS/IoT attack vectors, where a path in the attack DAG that does not represent a known CPS/IoT attack vector represents an unexploited CPS/IoT attack vector. The method also includes applying a trained machine learning module to the attack DAG to predict new CPS/IoT vulnerability exploits. The method further includes constructing a defense DAG configured to protect against the known CPS/IoT attacks, the unexploited CPS/IoT attacks, and the new CPS/IoT vulnerability exploits.Type: ApplicationFiled: February 25, 2020Publication date: June 23, 2022Applicant: The Trustees of Princeton UniversityInventors: Tanujay Saha, Najwa Aaraj, Niraj K. Jha
-
Publication number: 20220036150Abstract: According to various embodiments, a method for generating a compact and accurate neural network for a dataset is disclosed. The method includes providing an initial neural network architecture; performing a dataset modification on the dataset, the dataset modification including reducing dimensionality of the dataset; performing a first compression step on the initial neural network architecture that results in a compressed neural network architecture, the first compression step including reducing a number of neurons in one or more layers of the initial neural network architecture based on a feature compression ratio determined by the reduced dimensionality of the dataset; and performing a second compression step on the compressed neural network architecture, the second compression step including one or more of iteratively growing connections, growing neurons, and pruning connections until a desired neural network architecture has been generated.Type: ApplicationFiled: July 12, 2019Publication date: February 3, 2022Applicant: The Trustees of Princeton UniversityInventors: Shayan HASSANTABAR, Zeyu WANG, Niraj K. JHA
-
Publication number: 20210357741Abstract: In a system and method for processing detected signals at a detector using a processor, a set of data is converted into a compressed set of data using a compressive sensing component controlled via a processor, the compressed set of data is transformed into a vector and the vector is filtered using a machine learning component controlled via the processor, the filtered vector is encrypted using an encryption component controlled via the processor, and the filtered vector is integrity protected using an integrity protection component controlled via the processor.Type: ApplicationFiled: January 24, 2018Publication date: November 18, 2021Applicant: The Trustees of Princeton UniversityInventor: Niraj K. Jha
-
Publication number: 20210182683Abstract: According to various embodiments, a method for generating one or more optimal neural network architectures is disclosed. The method includes providing an initial seed neural network architecture and utilizing sequential phases to synthesize the neural network until a desired neural network architecture is reached. The phases include a gradient-based growth phase and a magnitude-based pruning phase.Type: ApplicationFiled: October 25, 2018Publication date: June 17, 2021Applicant: The Trustees of Princeton UniversityInventors: Xiaoliang DAI, Hongxu YIN, Niraj K. JHA
-
Publication number: 20210133540Abstract: According to various embodiments, a method for generating an optimal hidden-layer long short-term memory (H-LSTM) architecture is disclosed. The H-LSTM architecture includes a memory cell and a plurality of deep neural network (DNN) control gates enhanced with hidden layers. The method includes providing an initial seed H-LSTM architecture, training the initial seed H-LSTM architecture by growing one or more connections based on gradient information and iteratively pruning one or more connections based on magnitude information, and terminating the iterative pruning when training cannot achieve a predefined accuracy threshold.Type: ApplicationFiled: March 14, 2019Publication date: May 6, 2021Applicant: The Trustees of Princeton UniversityInventors: Xiaoliang DAI, Hongxu YIN, Niraj K. JHA
-
Patent number: 10986994Abstract: According to various embodiments, a stress detection and alleviation (SoDA) system for a user is disclosed. The system includes a SoDA device configured with one or more processors that receive wearable medical sensor (WMS) data from a plurality of WMSs. The processors are programmed to remove one or more artifacts from the WMS data, extract a set of features from the WMS data, remove correlated features from the extracted features to obtain a reduced set of features, classify the reduced set of features in order to determine whether the user is stressed, and generate a response based on whether the user is stressed.Type: GrantFiled: December 29, 2017Date of Patent: April 27, 2021Assignee: THE TRUSTEES OF PRINCETON UNIVERSITYInventors: Ayten Ozge Akmandor, Niraj K. Jha
-
Patent number: 10798238Abstract: According to various embodiments, a method for locating the user of a mobile device without accessing global position system (GPS) data is disclosed. The method includes determining the last location that the user was connected to a wireless network. The method further includes compiling publicly-available auxiliary information related to the last location. The method additionally includes classifying an activity of the user to driving, traveling on a plane, traveling on a train, or walking. The method also includes estimating the location of the user based on sensory and non-sensory data of the mobile device particular to the activity classification of the user.Type: GrantFiled: October 13, 2017Date of Patent: October 6, 2020Assignee: THE TRUSTEES OF PRINCETON UNIVERSITYInventors: Arsalan Mosenia, Xiaoliang Dai, Prateek Mittal, Niraj K. Jha
-
Patent number: 10722719Abstract: According to some embodiments, a system for securing communications between an implantable wearable medical device (IWMD) and an external device (ED) is disclosed. The system includes a wireless radio frequency (RF) channel configured for communication between the IWMD and the ED. The system further includes a vibration-based side channel configured for verifying communication between the IWMD and the ED such that the RF channel is activated only when the IWMD detects a vibration signal generated by an ED.Type: GrantFiled: February 12, 2016Date of Patent: July 28, 2020Assignee: THE TRUSTEES OF PRINCETON UNIVERSITYInventors: Younghyun Kim, Woo Suk Lee, Vijay Raghunathan, Niraj K. Jha, Anand Raghunathan
-
Patent number: 10652237Abstract: A user authentication system for an electronic device for use with a plurality of wireless wearable medical sensors (WMSs) and a wireless base station that receives a biomedical data stream (biostream) from each WMS. The system includes a BioAura engine located on a server, the server has a wireless transmitter/receiver with receive buffers that store the plurality of biostreams, the BioAura engine has a look up stage and a classifier, the classifier generates an authentication output based on the plurality of biostreams, the authentication output authenticates the user's access to the electronic device. The wireless base station has a transmitter/receiver having receive buffers that store the biomedical data from each WMS, the wireless base station has a communication engine that retrieves the biostream from each WMS and transmits the plurality of biostreams to the server.Type: GrantFiled: February 6, 2017Date of Patent: May 12, 2020Assignees: THE TRUSTEES OF PRINCETON UNIVERSITY, INDIAN STATISTICAL INSTITUTE, PURDUE RESEARCH FOUNDATIONInventors: Arsalan Mosenia, Susmita Sur-Kolay, Anand Raghunathan, Niraj K. Jha
-
Publication number: 20190374160Abstract: According to various embodiments, a hierarchical health decision support system (HDSS) configured to receive data from one or more wearable medical sensors (WMSs) is disclosed. The system includes a clinical decision support system, which includes a diagnosis engine configured to generate diagnostic suggestions based on the data received from the WMSs. The HDSS is configured with a plurality of tiers to sequentially model general healthcare from daily health monitoring, initial clinical checkup, detailed clinical examination, and postdiagnostic treatment.Type: ApplicationFiled: December 29, 2017Publication date: December 12, 2019Applicant: The Trustees of Princeton UniversityInventors: Hongxu Yin, Niraj K. Jha
-
Patent number: 10506433Abstract: An implantable medical device (IMD) configured to communicate with an external device (ED). The ED supports two way RF communications and has a light source. The IMD includes a processor coupled to an optical detector, the processor is configured to verify that light is being received from the ED light source and that the ED is a trusted device, establishing a unidirectional optical channel from the ED to the IMD. An RF transceiver is coupled to the processor, the processor being configured permit two way RF communications with the ED only under a condition that the ED is verified as a trusted device. The processor may be configure to wake up periodically or aperiodically to check for the presence of light from the ED light source. The processor may be configured to detect a multi-bit message from the ED via the unidirectional optical channel. The multi-bit message may include a key.Type: GrantFiled: October 3, 2017Date of Patent: December 10, 2019Assignee: THE TRUSTEES OF PRINCETON UNIVERSITYInventors: Arsalan Mosenia, Niraj K. Jha
-
Publication number: 20190289125Abstract: According to various embodiments, a method for locating the user of a mobile device without accessing global position system (GPS) data is disclosed. The method includes determining the last location that the user was connected to a wireless network. The method further includes compiling publicly-available auxiliary information related to the last location. The method additionally includes classifying an activity of the user to driving, traveling on a plane, traveling on a train, or walking. The method also includes estimating the location of the user based on sensory and non-sensory data of the mobile device particular to the activity classification of the user.Type: ApplicationFiled: October 13, 2017Publication date: September 19, 2019Applicant: The Trustees of Princeton UniversityInventors: Arsalan Mosenia, Xiaoliang Dai, Prateek Mittal, Niraj K. Jha