Patents by Inventor Yunhan Jia

Yunhan Jia has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11216699
    Abstract: Embodiments of the disclosure disclose a system to mitigate against adversarial input samples for machine learning (ML)/artificial intelligence (AI) models. According to one embodiment, a system receives a query from a client for a ML service. The system calculates a similarity score for the query based on a number of prior queries received from the client, the similarity score representing a similarity between the received query and the prior queries. The system determines that the query is an adversarial query in response to determining that the similarity score is above a predetermined threshold.
    Type: Grant
    Filed: June 13, 2019
    Date of Patent: January 4, 2022
    Assignee: BAIDU USA LLC
    Inventors: Yunhan Jia, Zhenyu Zhong, Yulong Zhang, Tao Wei
  • Patent number: 10990855
    Abstract: In one embodiment, a system receives a first image captured by a capturing device of an ADV. The system applies an image transformation to the first image to generate a second image. The system applies an object detection model to the first and the second images to generate a first and a second output, respectively. The system calculates a similarity metric between the first and the second output. The system detects the first image as an adversarial sample if a temporal variation of the similarity metric between the first image and a prior image is above a threshold.
    Type: Grant
    Filed: June 13, 2019
    Date of Patent: April 27, 2021
    Assignee: BAIDU USA LLC
    Inventors: Yunhan Jia, Zhenyu Zhong, Yulong Zhang, Tao Wei
  • Publication number: 20200394472
    Abstract: In one embodiment, a system receives a first image captured by a capturing device of an ADV. The system applies an image transformation to the first image to generate a second image. The system applies an object detection model to the first and the second images to generate a first and a second output, respectively. The system calculates a similarity metric between the first and the second output. The system detects the first image as an adversarial sample if a temporal variation of the similarity metric between the first image and a prior image is above a threshold.
    Type: Application
    Filed: June 13, 2019
    Publication date: December 17, 2020
    Inventors: Yunhan JIA, Zhenyu ZHONG, Yulong ZHANG, Tao WEI
  • Publication number: 20200394466
    Abstract: Embodiments of the disclosure disclose a system to mitigate against adversarial input samples for machine learning (ML)/artificial intelligence (AI) models. According to one embodiment, a system receives a query from a client for a ML service. The system calculates a similarity score for the query based on a number of prior queries received from the client, the similarity score representing a similarity between the received query and the prior queries. The system determines that the query is an adversarial query in response to determining that the similarity score is above a predetermined threshold.
    Type: Application
    Filed: June 13, 2019
    Publication date: December 17, 2020
    Inventors: Yunhan JIA, Zhenyu ZHONG, Yulong ZHANG, Tao WEI
  • Patent number: 10506372
    Abstract: Techniques are disclosed for determining whether a mobile device is located indoors or outdoors. In some embodiments, a mobile device may utilize a fusion of the information from multiple sensors, such as a RGB sensor, a proximity sensor, a light intensity sensor, and a WiFi radio, to determine whether the mobile device is located indoors or outdoors.
    Type: Grant
    Filed: May 2, 2017
    Date of Patent: December 10, 2019
    Assignees: T-Mobile USA, Inc., The Regents of the University of Michigan
    Inventors: Jong Sung Yoon, Jie Hui, Michael Mitchell, Zhuoqing Morley Mao, Yunhan Jia, Chao Kong
  • Patent number: 10498621
    Abstract: Described herein is a network device configured to determine and provide alerts of communication link failures across layers of a communication stack of the network device. The network device determines at a radio link layer of the communication stack that a communication link between the network device and a network has failed. The network device then alerts one or more components associated with another layer of the communication stack of the determination that the communication link has failed.
    Type: Grant
    Filed: October 24, 2017
    Date of Patent: December 3, 2019
    Assignee: T-Mobile USA, Inc.
    Inventors: Jie Hui, Yunhan Jia, Jun Liu, Kranthi Sontineni
  • Patent number: 10339456
    Abstract: A VoLTE diagnostic engine may receive VoLTE call records of VoLTE calls that are carried by a wireless carrier network for multiple user devices. The VoLTE call records may include performance indicators and call features for the voice calls. Each call feature of a VoLTE call may represent a circumstance under which the VoLTE call is established and ended. The VoLTE diagnostic engine may apply a decision tree to the VoLTE call records to identify critical features of one or more call conditions that lead to Quality of Experience (QoE) problems for the VoLTE calls captured in the VoLTE call records. Each call condition may include a subset of the call features. Further, the VoLTE diagnostic engine may apply a classifier on the critical features to determine a root cause of a QoE problem for at least one call conditions.
    Type: Grant
    Filed: May 4, 2017
    Date of Patent: July 2, 2019
    Assignee: T-Mobile USA, Inc.
    Inventors: Jie Hui, Yunhan Jia, Yihua Guo, Alex Yoon, Antoine Tran, Kranthi Sontineni, Z. Morley Mao
  • Patent number: 10291586
    Abstract: Techniques and devices for circumventing wireless data monitoring in communications between a communication device and a proxy server, as well as systems and techniques for detecting and resolving vulnerabilities in wireless data monitoring systems are described herein. The techniques for circumventing wireless data monitoring may include manipulating a routing table of a communication device, encapsulating data in an unmonitored protocol, and transmitting the encapsulated data in a “bearer,” or communications channel, to a proxy server that fulfills requests included in the encapsulated data. Furthermore, the techniques for detecting and resolving network vulnerabilities may include restricting protocols by bearers in an Access Control List, limiting a bandwidth of a bearer, or protecting a routing table in a secure location of the communication device.
    Type: Grant
    Filed: October 30, 2017
    Date of Patent: May 14, 2019
    Assignee: T-Mobile USA, Inc.
    Inventors: Yunhan Jia, Jong Sung Yoon, Jie Hui, Samson Kim-Sun Kwong, Kevin Lau, Salvador Mendoza, Zhuoqing Morley Mao
  • Publication number: 20180192303
    Abstract: A VoLTE diagnostic engine may receive VoLTE call records of VoLTE calls that are carried by a wireless carrier network for multiple user devices. The VoLTE call records may include performance indicators and call features for the voice calls. Each call feature of a VoLTE call may represent a circumstance under which the VoLTE call is established and ended. The VoLTE diagnostic engine may apply a decision tree to the VoLTE call records to identify critical features of one or more call conditions that lead to Quality of Experience (QoE) problems for the VoLTE calls captured in the VoLTE call records. Each call condition may include a subset of the call features. Further, the VoLTE diagnostic engine may apply a classifier on the critical features to determine a root cause of a QoE problem for at least one call conditions.
    Type: Application
    Filed: May 4, 2017
    Publication date: July 5, 2018
    Inventors: Jie Hui, Yunhan Jia, Yihua Guo, Alex Yoon, Antoine Tran, Kranthi Sontineni, Z. Morley Mao
  • Publication number: 20180115524
    Abstract: Techniques and devices for circumventing wireless data monitoring in communications between a communication device and a proxy server, as well as systems and techniques for detecting and resolving vulnerabilities in wireless data monitoring systems are described herein. The techniques for circumventing wireless data monitoring may include manipulating a routing table of a communication device, encapsulating data in an unmonitored protocol, and transmitting the encapsulated data in a “bearer,” or communications channel, to a proxy server that fulfills requests included in the encapsulated data. Furthermore, the techniques for detecting and resolving network vulnerabilities may include restricting protocols by bearers in an Access Control List, limiting a bandwidth of a bearer, or protecting a routing table in a secure location of the communication device.
    Type: Application
    Filed: October 30, 2017
    Publication date: April 26, 2018
    Inventors: Yunhan Jia, Jong Sung Yoon, Jie Hui, Samson Kim-Sun Kwong, Kevin Lau, Salvador Mendoza, Zhuoqing Morley Mao
  • Publication number: 20180048548
    Abstract: Described herein is a network device configured to determine and provide alerts of communication link failures across layers of a communication stack of the network device. The network device determines at a radio link layer of the communication stack that a communication link between the network device and a network has failed. The network device then alerts one or more components associated with another layer of the communication stack of the determination that the communication link has failed.
    Type: Application
    Filed: October 24, 2017
    Publication date: February 15, 2018
    Inventors: Jie Hui, Yunhan Jia, Jun Liu, Kranthi Sontineni
  • Publication number: 20170366943
    Abstract: Techniques are disclosed for determining whether a mobile device is located indoors or outdoors. In some embodiments, a mobile device may utilize a fusion of the information from multiple sensors, such as a RGB sensor, a proximity sensor, a light intensity sensor, and a WiFi radio, to determine whether the mobile device is located indoors or outdoors.
    Type: Application
    Filed: May 2, 2017
    Publication date: December 21, 2017
    Inventors: Jong Sung Yoon, Jie Hui, Michael Mitchell, Zhuoqing Morley Mao, Yunhan Jia, Chao Kong
  • Patent number: 9843948
    Abstract: A telecommunication carrier may use data collected from user devices to pinpoint sources of data interruptions in the communication connection between a carrier network and the user devices. The telecommunication carrier may receive multiple reports of detected data interruptions at one or more computing devices of a carrier network. The detected data interruptions include a data interruption to a user device that is detected by an agent application on the user device that monitors of at least one of an audio pathway or a video pathway of the user device. The telecommunication carrier may aggregate data interruption information from the multiple reports of the detected data interruptions, and analyze the data interruption information to pinpoint one or more sources of a detected data interruption.
    Type: Grant
    Filed: March 18, 2015
    Date of Patent: December 12, 2017
    Assignee: T-Mobile USA, Inc.
    Inventors: Jie Hui, Yunhan Jia, Suchit Satpathy, Kevin Lau, Kranthi Sontineni, Samson Kim-Sun Kwong
  • Patent number: 9825828
    Abstract: Described herein is a network device configured to determine and provide alerts of communication link failures across layers of a communication stack of the network device. The network device determines at a radio link layer of the communication stack that a communication link between the network device and a network has failed. The network device then alerts one or more components associated with another layer of the communication stack of the determination that the communication link has failed.
    Type: Grant
    Filed: November 19, 2014
    Date of Patent: November 21, 2017
    Assignee: T-Mobile USA, Inc.
    Inventors: Jie Hui, Yunhan Jia, Jun Liu, Kranthi Sontineni
  • Patent number: 9807058
    Abstract: Techniques and devices for circumventing wireless data monitoring in communications between a communication device and a proxy server, as well as systems and techniques for detecting and resolving vulnerabilities in wireless data monitoring systems are described herein. The techniques for circumventing wireless data monitoring may include manipulating a routing table of a communication device, encapsulating data in an unmonitored protocol, and transmitting the encapsulated data in a “bearer,” or communications channel, to a proxy server that fulfills requests included in the encapsulated data. Furthermore, the techniques for detecting and resolving network vulnerabilities may include restricting protocols by bearers in an Access Control List, limiting a bandwidth of a bearer, or protecting a routing table in a secure location of the communication device.
    Type: Grant
    Filed: September 21, 2015
    Date of Patent: October 31, 2017
    Assignee: T-Mobile USA, Inc.
    Inventors: Yunhan Jia, Jong Sung Yoon, Jie Hui, Samson Kim-Sun Kwong, Kevin Lau, Salvador Mendoza, Zhuoqing Morley Mao
  • Publication number: 20170005989
    Abstract: Techniques and devices for circumventing wireless data monitoring in communications between a communication device and a proxy server, as well as systems and techniques for detecting and resolving vulnerabilities in wireless data monitoring systems are described herein. The techniques for circumventing wireless data monitoring may include manipulating a routing table of a communication device, encapsulating data in an unmonitored protocol, and transmitting the encapsulated data in a “bearer,” or communications channel, to a proxy server that fulfills requests included in the encapsulated data. Furthermore, the techniques for detecting and resolving network vulnerabilities may include restricting protocols by bearers in an Access Control List, limiting a bandwidth of a bearer, or protecting a routing table in a secure location of the communication device.
    Type: Application
    Filed: September 21, 2015
    Publication date: January 5, 2017
    Inventors: Yunhan Jia, Jong Sung Yoon, Jie Hui, Samson Kim-Sun Kwong, Kevin Lau, Salvador Mendoza, Zhuoqing Morley Mao
  • Publication number: 20160277952
    Abstract: A telecommunication carrier may use data collected from user devices to pinpoint sources of data interruptions in the communication connection between a carrier network and the user devices. The telecommunication carrier may receive multiple reports of detected data interruptions at one or more computing devices of a carrier network. The detected data interruptions include a data interruption to a user device that is detected by an agent application on the user device that monitors of at least one of an audio pathway or a video pathway of the user device. The telecommunication carrier may aggregate data interruption information from the multiple reports of the detected data interruptions, and analyze the data interruption information to pinpoint one or more sources of a detected data interruption.
    Type: Application
    Filed: March 18, 2015
    Publication date: September 22, 2016
    Inventors: Jie Hui, Yunhan Jia, Suchit Satpathy, Kevin Lau, Kranthi Sontineni, Samson Kim-Sun Kwong
  • Publication number: 20160065433
    Abstract: Described herein is a network device configured to determine and provide alerts of communication link failures across layers of a communication stack of the network device. The network device determines at a radio link layer of the communication stack that a communication link between the network device and a network has failed. The network device then alerts one or more components associated with another layer of the communication stack of the determination that the communication link has failed.
    Type: Application
    Filed: November 19, 2014
    Publication date: March 3, 2016
    Inventors: Jie Hui, Yunhan Jia, Jun Liu, Kranthi Sontineni