Patents by Inventor Yufei Han

Yufei Han has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10148690
    Abstract: A system and method for detecting malicious hijack events in real-time is provided. The method may include receiving routing data associated with a Border Gateway Protocol (BGP) event from at least one BGP router. The method may further include generating a hijack detection model using a machine learning technique, such as Positive Unlabeled learning. The machine learning technique may include at least one data input and a probability output; wherein, the data input couples to receive a set of historically confirmed BGP hijacking data and the routing data, while the probability output transmits a probability value for the malicious event which may be calculated based upon the data input. Finally, the method may include classifying the BGP event as a malicious event or a benign event using the BGP hijack model and correcting routing tables that have been corrupted by a malicious event.
    Type: Grant
    Filed: December 21, 2015
    Date of Patent: December 4, 2018
    Assignee: SYMANTEC CORPORATION
    Inventors: Yun Shen, Yufei Han, Pierre-Antoine Vervier
  • Patent number: 10116680
    Abstract: The disclosed computer-implemented method for evaluating infection risks based on profiled user behaviors may include (1) collecting user-behavior profiles that may include labeled profiles (e.g., infected profiles and/or clean profiles) and/or unlabeled profiles, (2) training a classification model to distinguish infected profiles from clean profiles using features and labels of the user-behavior profiles, and (3) using the classification model to predict (a) a likelihood that a computing system of a user will become infected based on a profile of user behaviors of the user and/or (b) a likelihood that a user behavior in the user-behavior profiles will result in a computing-system infection. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 21, 2016
    Date of Patent: October 30, 2018
    Assignee: Symantec Corporation
    Inventors: Yufei Han, Leylya Yumer, Pierre-Antoine Vervier, Matteo Dell'Amico
  • Patent number: 10063582
    Abstract: Securing compromised network devices in a network. In one embodiment, a method may include (a) identifying a Positive Unlabeled (PU) machine learning classifier, (b) selecting labeled positive samples and unlabeled positive and negative samples as a bootstrap subset of training data from a set of training data, (c) training the PU machine learning classifier, (d) repeating (a)-(c) one or more times to create a set of trained PU machine learning classifiers, (e) predicting probabilities that a network device in a network has been compromised using each of the trained PU machine learning classifiers, (f) combining the probabilities predicted at (e) to generate a combined risk score for the network device, (g) repeating (e)-(f) one or more times to create a ranked list of combined risk scores, and (h) performing a security action on one or more of the network devices in the ranked list.
    Type: Grant
    Filed: May 31, 2017
    Date of Patent: August 28, 2018
    Assignee: SYMANTEC CORPORATION
    Inventors: Wangyan Feng, Shuning Wu, Yufei Han, Yun Shen
  • Publication number: 20170180418
    Abstract: A system and method for detecting malicious hijack events in real-time is provided. The method may include receiving routing data associated with a Border Gateway Protocol (BGP) event from at least one BGP router. The method may further include processing the routing data to generate a list of features representing ownership and various other details relating to origin and upstream equipment. The method may further include generating a hijack detection model using the routing data and the list of features, where a machine learning technique, such as Positive Unlabeled learning technique is employed. The machine learning technique may include at least one data input and a probability output; wherein, the data input couples to receive a set of historically confirmed BGP hijacking data and the routing data, while the probability output transmits a probability value for the malicious event which may be calculated based upon the data input.
    Type: Application
    Filed: December 21, 2015
    Publication date: June 22, 2017
    Inventors: Yun Shen, Yufei Han, Pierre-Antoine Vervier
  • Patent number: 9628506
    Abstract: A computer-implemented method for detecting security events may include (1) identifying facets of candidate security events detected by a network security system, (2) assigning each of the facets of the candidate security events to one of multiple groups of facets to create permutations of the facets, (3) comparing, for each group of facets, the candidate security events according to a similarity algorithm that indicates similarity between the candidate security events, (4) generating, for each group of facets, a weak classifier for detecting security events based on a nearest neighbor graph, and (5) performing, by the network security system, a remedial action in response to classifying a candidate security event as a security threat by applying a combination of the weak classifiers for the groups of facets to the candidate security event. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 26, 2015
    Date of Patent: April 18, 2017
    Assignee: Symantec Corporation
    Inventors: Yufei Han, Yun Shen
  • Publication number: 20160232707
    Abstract: Embodiments of the present invention disclose an image processing method and apparatus, and a computer device. The image processing method includes: receiving information sent by a central processing unit (CPU), about a scene within a preset range around a to-be-rendered target object; rendering the received scene to obtain scene depth parameters, where the scene is obtained through shooting by a camera located at a ray light source; rendering the to-be-rendered target object to obtain rendering depth parameters, where the to-be-rendered target object is obtained through shooting by a camera not located at a ray light source; calculating ambient occlusion (AO) maps of the to-be-rendered target object in directions of ray light sources according to the scene depth parameters and the rendering depth parameters; and overlaying the AO maps in the directions of the ray light sources, to obtain an output image.
    Type: Application
    Filed: April 15, 2016
    Publication date: August 11, 2016
    Inventors: Yufei HAN, Xiaozheng JIAN, Hui ZHANG
  • Patent number: 8243391
    Abstract: Systems and methods for a slider and suspension assembly are discussed. The slider and suspension assembly comprises a slider, a suspension, and composite fiber solder. The composite fiber solder is coupled to the suspension and coupled to the slider. The composite fiber solder comprises a fiber, wherein the fiber is configured to increase a fracture resistance of the composite fiber solder compared to a solder without the fiber.
    Type: Grant
    Filed: September 26, 2008
    Date of Patent: August 14, 2012
    Assignee: Hitachi Global Storage Technologies, Netherlands B.V.
    Inventors: Yufei Han, Hanxiang He, Shaoyong Liu, Boon Kee Tan
  • Patent number: 8159778
    Abstract: A method and system of controlling contamination within an HDD with a surface modified MCM 41/48 material. The method includes encasing the hard disk drive and a mesoporous material in an enclosure of the hard disk drive, wherein the mesoporous material sorbs contaminants within said enclosure.
    Type: Grant
    Filed: April 6, 2009
    Date of Patent: April 17, 2012
    Assignee: Hitachi Global Storage Technologies, Netherlands B.V.
    Inventors: Feng Gao, Yufei Han, Hongyan Jiang, Shaoyong Liu
  • Publication number: 20100254040
    Abstract: A method and system of controlling contamination within an HDD with a surface modified MCM 41/48 material. The method includes encasing the hard disk drive and a mesoporous material in an enclosure of the hard disk drive, wherein the mesoporous material sorbs contaminants within said enclosure.
    Type: Application
    Filed: April 6, 2009
    Publication date: October 7, 2010
    Inventors: Feng GAO, Yufei HAN, Hongyan JIANG, Shaoyong LIU
  • Publication number: 20100079914
    Abstract: Systems and methods for a slider and suspension assembly are discussed. The slider and suspension assembly comprises a slider, a suspension, and composite fiber solder. The composite fiber solder is coupled to the suspension and coupled to the slider. The composite fiber solder comprises a fiber, wherein the fiber is configured to increase a fracture resistance of the composite fiber solder compared to a solder without the fiber.
    Type: Application
    Filed: September 26, 2008
    Publication date: April 1, 2010
    Inventors: Yufei HAN, Hanxiang He, Shaoyong Liu, Boon Kee Tan