Patents by Inventor Yonghong Huang

Yonghong Huang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240095356
    Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed to implement trusted transfer learning on transformer-based phishing detection. In some examples, an apparatus includes processor circuitry to perform instructions to instantiate circuitry. The instantiated circuitry provides a uniform resource locator (URL) matrix corresponding to at least a portion of a URL address to a first transformer model and provide a web content data matrix corresponding to web content data on a web page at the URL address to a second transformer model. The instantiated circuitry performs data fusion on a first output from the first transformer model and a second output from the second transformer model to create a combined result. The instantiated circuitry determines at least whether phishing is detected at the URL address based at least in part on the combined result.
    Type: Application
    Filed: September 9, 2022
    Publication date: March 21, 2024
    Inventors: Yonghong Huang, Steve Grobman, John Wagener
  • Patent number: 11743276
    Abstract: Methods, apparatus, systems and articles of manufacture for producing generic Internet Protocol (IP) reputation through cross-protocol analysis are disclosed. An example apparatus includes a data collector to gather a first data set representing IP telemetry data for a first protocol, the data collector to gather a second data set representing IP telemetry data for a second protocol different from the first protocol. A label generator is to generate a training data set based on records in the first data set and the second data set having matching IP addresses, the training data set to include combined label indicating whether each of the respective matching IP addresses is malicious. A model trainer is to train a machine learning model using the training data set. A model executor is to, responsive to a request from a client device, execute the machine learning model to determine whether a requested IP address is malicious.
    Type: Grant
    Filed: June 23, 2021
    Date of Patent: August 29, 2023
    Assignee: McAfee, LLC
    Inventors: Adam Wosotowsky, Yonghong Huang, Eric Peterson, John Wagener, Joanna Negrete, Armando Rodriguez, Celeste Fralick, Sandeep Chandana
  • Patent number: 11689550
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to analyze network traffic for malicious activity. An example apparatus includes a graph generator to, in response to obtaining one or more internet protocol addresses included within input data, generate a graph data structure based on one or more features of the one or more internet protocol addresses in the input data, a file generator to generate a first matrix using the graph data structure, the first matrix to represent nodes in the graph data structure and generate a second matrix using the graph data structure, the second matrix to represent edges in the graph data structure, and a classifier to, using the first matrix and the second matrix, classify at least one of the one or more internet protocol addresses to identify a reputation of the at least one of the one or more internet protocol addresses.
    Type: Grant
    Filed: March 13, 2020
    Date of Patent: June 27, 2023
    Assignee: MCAFEE, LLC
    Inventors: Yonghong Huang, Armando Rodriguez, Adam Wosotowsky, John Wagener, Joanna Negrete, Eric Peterson, Celeste Fralick
  • Publication number: 20230195828
    Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed. An example apparatus to categorize web content includes interface circuitry to receive first results data from a pre-trained model; model tuner circuitry to: determine, based on the first results data, an adjustment to a parameter of the pre-trained model; and provide, via the interface circuitry, the adjustment to the pre-trained model; and feature extractor circuitry to: receive, via the model tuner circuitry, second results data that satisfies a performance threshold; and identify, from the second results data, at least one application specific feature from a tuned version of the pre-trained model.
    Type: Application
    Filed: September 14, 2022
    Publication date: June 22, 2023
    Inventor: Yonghong Huang
  • Publication number: 20230056936
    Abstract: There is disclosed in one example a computing apparatus, including: a hardware platform, including a processor, a memory, and a network interface; a bucketized reputation modifier table; and instructions encoded within the memory to instruct the processor to: perform a feature-based malware analysis of an object; assign the object a malware reputation according to the feature-based malware analysis; query and receive via the network interface a complementary score for a complementary property of the object; query the bucketized reputation modifier table according to the complementary score to receive a reputation modifier for the object; adjust the object's reputation according to the reputation modifier; and take a security action according to the adjusted reputation.
    Type: Application
    Filed: November 1, 2022
    Publication date: February 23, 2023
    Inventors: Steven Grobman, Jonathan B. King, Yonghong Huang, Amit Kumar
  • Publication number: 20220414219
    Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed. An example apparatus comprises at least one memory, instructions, and processor circuitry to execute the instructions. The processor circuitry executes the instructions to provide a neural network a plurality of raw bytes for malware classification. The processor circuitry executes the instructions to generate a visualization of features extracted from the plurality of raw bytes. The processor circuitry executes the instructions to generate a heatmap for the plurality of raw bytes based on gradient activations of the neural networks. The processor circuitry executes the instructions to perform a dimensionality reduction based on features of the plurality of raw bytes identified in the heatmap.
    Type: Application
    Filed: June 22, 2022
    Publication date: December 29, 2022
    Inventor: Yonghong Huang
  • Patent number: 11526745
    Abstract: Methods, apparatus, systems and articles of manufacture for federated training of a neural network using trusted edge devices are disclosed. An example system includes an aggregator device to aggregate model updates provided by one or more edge devices. The one or more edge devices to implement respective neural networks, and provide the model updates to the aggregator device. At least one of the edge devices to implement the neural network within a trusted execution environment.
    Type: Grant
    Filed: February 8, 2018
    Date of Patent: December 13, 2022
    Assignee: Intel Corporation
    Inventors: Micah Sheller, Cory Cornelius, Jason Martin, Yonghong Huang, Shih-Han Wang
  • Patent number: 11520888
    Abstract: There is disclosed in one example a computing apparatus, including: a hardware platform, including a processor, a memory, and a network interface; a bucketized reputation modifier table; and instructions encoded within the memory to instruct the processor to: perform a feature-based malware analysis of an object; assign the object a malware reputation according to the feature-based malware analysis; query and receive via the network interface a complementary score for a complementary property of the object; query the bucketized reputation modifier table according to the complementary score to receive a reputation modifier for the object; adjust the object's reputation according to the reputation modifier; and take a security action according to the adjusted reputation.
    Type: Grant
    Filed: October 29, 2020
    Date of Patent: December 6, 2022
    Assignee: McAfee, LLC
    Inventors: Steven Grobman, Jonathan B. King, Yonghong Huang, Amit Kumar
  • Patent number: 11501001
    Abstract: Embodiments discussed herein may be generally directed to systems and techniques to generate a quality score based on an observation and an action caused by an actor agent during a testing phase. Embodiments also include determining a temporal difference between the quality score and a previous quality score based on a previous observation and a previous action, determining whether the temporal difference exceeds a threshold value, and generating an attack indication in response to determining the temporal difference exceeds the threshold value.
    Type: Grant
    Filed: June 24, 2020
    Date of Patent: November 15, 2022
    Assignee: INTEL CORPORATION
    Inventors: Shih-Han Wang, Yonghong Huang, Micah Sheller, Cory Cornelius
  • Publication number: 20220318383
    Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed. An example apparatus includes at least one memory, instructions; and processor circuitry to execute the instructions to train a neural network with a plurality of raw byte data samples, perform feature extraction on ones of the plurality of raw byte data samples, determine whether ones of the plurality of raw byte data samples are clean or malicious using the extracted features, and determine a family of malware to which an identified malicious sample belongs.
    Type: Application
    Filed: April 5, 2022
    Publication date: October 6, 2022
    Inventors: Yonghong Huang, Steven Grobman, Jonathan King, Craig Schmugar, Abhishek Karnik, Celeste Fralick, Vitaly Zaytsev
  • Publication number: 20220321579
    Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed. An example apparatus includes at least one memory, instructions, and processor circuitry to execute the instructions. The processor circuitry executes the instructions to identify a test data distribution, generate a first visualization of the identified test data distribution, select a visualization type for a machine learning model, generate a second visualization including an indication of features extracted from the test data by the machine learning model, and generate a third visualization of results of inference performed by the machine learning model, the inference performed on the test data.
    Type: Application
    Filed: April 5, 2022
    Publication date: October 6, 2022
    Inventors: Yonghong Huang, Steven Grobman, Jonathan King
  • Patent number: 11297084
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to perform malware detection using a generative adversarial network. An example apparatus includes a first encoder network to encode an input sample into a first encoded sample, the first encoder network implemented using a multilayer perception (MLP) network, a generator network to reconstruct the first encoded sample to generate a reconstructed sample, a discriminator network to, in response to obtaining the first encoded sample and the reconstructed sample, generate a loss function based on the reconstructed sample and the input sample, and an optimization processor to, when the loss function satisfies a threshold loss value, classify the input sample as malicious.
    Type: Grant
    Filed: September 30, 2019
    Date of Patent: April 5, 2022
    Assignee: MCAFEE, LLC
    Inventors: Yonghong Huang, Raj Vardhan, Celeste Fralick
  • Publication number: 20220083662
    Abstract: There is disclosed in one example a computing apparatus, including: a hardware platform, including a processor, a memory, and a network interface; a bucketized reputation modifier table; and instructions encoded within the memory to instruct the processor to: perform a feature-based malware analysis of an object; assign the object a malware reputation according to the feature-based malware analysis; query and receive via the network interface a complementary score for a complementary property of the object; query the bucketized reputation modifier table according to the complementary score to receive a reputation modifier for the object; adjust the object's reputation according to the reputation modifier; and take a security action according to the adjusted reputation.
    Type: Application
    Filed: October 29, 2020
    Publication date: March 17, 2022
    Applicant: McAfee, LLC
    Inventors: Steven Grobman, Jonathan B. King, Yonghong Huang, Amit Kumar
  • Patent number: 11200318
    Abstract: Methods and apparatus to detect adversarial malware are disclosed. An example adversarial malware detector includes a machine learning engine to classify a first feature representation representing features of a program as benign or malware, a feature perturber to, when the first feature representation is classified as benign, remove a first one of the features to form a second feature representation, and a decider to classify the program as adversarial malware when the machine learning engine classifies the second feature representation as malware.
    Type: Grant
    Filed: December 28, 2018
    Date of Patent: December 14, 2021
    Assignee: McAfee, LLC
    Inventors: Yonghong Huang, Raj Vardhan, Celeste R. Fralick, Gabriel G. Infante-Lopez, Dattatraya Kulkarni, Srikanth Nalluri, Sonam Bothra
  • Publication number: 20210320934
    Abstract: Methods, apparatus, systems and articles of manufacture for producing generic Internet Protocol (IP) reputation through cross-protocol analysis are disclosed. An example apparatus includes a data collector to gather a first data set representing IP telemetry data for a first protocol, the data collector to gather a second data set representing IP telemetry data for a second protocol different from the first protocol. A label generator is to generate a training data set based on records in the first data set and the second data set having matching IP addresses, the training data set to include combined label indicating whether each of the respective matching IP addresses is malicious. A model trainer is to train a machine learning model using the training data set. A model executor is to, responsive to a request from a client device, execute the machine learning model to determine whether a requested IP address is malicious.
    Type: Application
    Filed: June 23, 2021
    Publication date: October 14, 2021
    Inventors: Adam Wosotowsky, Yonghong Huang, Eric Peterson, John Wagener, Joanna Negrete, Armando Rodriguez, Celeste Fralick, Sandeep Chandana
  • Publication number: 20210288976
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to analyze network traffic for malicious activity. An example apparatus includes a graph generator to, in response to obtaining one or more internet protocol addresses included within input data, generate a graph data structure based on one or more features of the one or more internet protocol addresses in the input data, a file generator to generate a first matrix using the graph data structure, the first matrix to represent nodes in the graph data structure and generate a second matrix using the graph data structure, the second matrix to represent edges in the graph data structure, and a classifier to, using the first matrix and the second matrix, classify at least one of the one or more internet protocol addresses to identify a reputation of the at least one of the one or more internet protocol addresses.
    Type: Application
    Filed: March 13, 2020
    Publication date: September 16, 2021
    Inventors: Yonghong Huang, Armando Rodriguez, Adam Wosotowsky, John Wagener, Joanna Negrete, Eric Peterson, Celeste Fralick
  • Patent number: 11079241
    Abstract: An embodiment of a semiconductor package apparatus may include technology to acquire location related information, acquire local area characteristic information, and verify the location related information based on the local area characteristic information. Other embodiments are disclosed and claimed.
    Type: Grant
    Filed: December 29, 2017
    Date of Patent: August 3, 2021
    Assignee: Intel Corporation
    Inventors: Liuyang Yang, Manoj Sastry, Yonghong Huang, Xiruo Liu, Noor Abani
  • Patent number: 11070572
    Abstract: Methods, apparatus, systems and articles of manufacture for producing generic Internet Protocol (IP) reputation through cross-protocol analysis are disclosed. An example apparatus includes a data collector to gather a first data set representing IP telemetry data for a first protocol, the data collector to gather a second data set representing IP telemetry data for a second protocol different from the first protocol. A label generator is to generate a training data set based on records in the first data set and the second data set having matching IP addresses, the training data set to include combined label indicating whether each of the respective matching IP addresses is malicious. A model trainer is to train a machine learning model using the training data set. A model executor is to, responsive to a request from a client device, execute the machine learning model to determine whether a requested IP address is malicious.
    Type: Grant
    Filed: July 9, 2019
    Date of Patent: July 20, 2021
    Assignee: McAfee, LLC
    Inventors: Adam Wosotowsky, Yonghong Huang, Eric Peterson, John Wagener, Joanna Negrete, Armando Rodriguez, Celeste Fralick, Sandeep Chandana
  • Publication number: 20210099474
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to perform malware detection using a generative adversarial network. An example apparatus includes a first encoder network to encode an input sample into a first encoded sample, the first encoder network implemented using a multilayer perception (MLP) network, a generator network to reconstruct the first encoded sample to generate a reconstructed sample, a discriminator network to, in response to obtaining the first encoded sample and the reconstructed sample, generate a loss function based on the reconstructed sample and the input sample, and an optimization processor to, when the loss function satisfies a threshold loss value, classify the input sample as malicious.
    Type: Application
    Filed: September 30, 2019
    Publication date: April 1, 2021
    Inventors: Yonghong Huang, Raj Vardhan, Celeste Fralick
  • Publication number: 20210014247
    Abstract: Methods, apparatus, systems and articles of manufacture for producing generic Internet Protocol (IP) reputation through cross-protocol analysis are disclosed. An example apparatus includes a data collector to gather a first data set representing IP telemetry data for a first protocol, the data collector to gather a second data set representing IP telemetry data for a second protocol different from the first protocol. A label generator is to generate a training data set based on records in the first data set and the second data set having matching IP addresses, the training data set to include combined label indicating whether each of the respective matching IP addresses is malicious. A model trainer is to train a machine learning model using the training data set. A model executor is to, responsive to a request from a client device, execute the machine learning model to determine whether a requested IP address is malicious.
    Type: Application
    Filed: July 9, 2019
    Publication date: January 14, 2021
    Inventors: Adam Wosotowsky, Yonghong Huang, Eric Peterson, John Wagener, Joanna Negrete, Armando Rodriguez, Celeste Fralick, Sandeep Chandana