Patents by Inventor Jiaping Gui
Jiaping Gui has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12242603Abstract: The disclosure provides a system, a method and a computer program product for dynamic scoring of a plurality of incidents. The system is configured to retrieve an incident of the plurality of incidents. The incident comprises at least one alert and is associated with a security breach. The system further generates an enriched alert based on enrichment of the at least one alert. The enrichment is based on security related data of the security breach. The system further identifies one or more entities and one or more observables associated with the generated enriched alert. The system determines a score for the retrieved incident based on at least the generated enriched alert and the generated behavioural entity model. The system is further configured to dynamically update the determined score for the retrieved incident based on an analysis of at least the retrieved incident and the generated behavioural entity model.Type: GrantFiled: January 16, 2023Date of Patent: March 4, 2025Assignee: Stellar Cyber, IncInventors: Qi Wang, Zhichun Li, Jiaping Gui, Shuchu Han
-
Publication number: 20240241949Abstract: The disclosure provides a system, a method and a computer program product for dynamic scoring of a plurality of incidents. The system is configured to retrieve an incident of the plurality of incidents. The incident comprises at least one alert and is associated with a security breach. The system further generates an enriched alert based on enrichment of the at least one alert. The enrichment is based on security related data of the security breach. The system further identifies one or more entities and one or more observables associated with the generated enriched alert. The system determines a score for the retrieved incident based on at least the generated enriched alert and the generated behavioural entity model. The system is further configured to dynamically update the determined score for the retrieved incident based on an analysis of at least the retrieved incident and the generated behavioural entity model.Type: ApplicationFiled: January 16, 2023Publication date: July 18, 2024Applicant: Stellar Cyber, Inc.Inventors: Qi Wang, Zhichun Li, Jiaping Gui, Shuchu Han
-
Publication number: 20240244071Abstract: The disclosure provides a system, a method and a computer program product for generating an automated incident. The system is configured to retrieve an alert of a plurality of alerts received from a plurality of heterogeneous sources. The alert is associated with a security breach. The system further generates a normalized alert based on normalization of the retrieved alert. The normalization is associated with a semantic similarity parameter. Further, the system generates an enriched alert based on enrichment of the generated normalized alert. The enrichment is based on security related data of the security breach associated with the generated normalized alert. The system further identifies a set of correlation features associated with the generated enriched alert. Furthermore, the system generates the automated incident associated with the alert based on at least the generated enriched alert and the identified set of correlation features associated with the enriched alert.Type: ApplicationFiled: January 16, 2023Publication date: July 18, 2024Applicant: Stellar Cyber, Inc.Inventors: Qi Wang, Zhichun Li, Jiaping Gui, Shuchu Han
-
Publication number: 20230252134Abstract: A new approach is proposed to support integration of EDR data from a plurality of EDR tools/sources into an Open XDR framework in an automated manner. First, EDR data generated by each of the plurality of EDR tools covering a plurality of assets is ingested into the Open XDR framework. The ingested EDR data is then normalized through a unified EDR data model. The normalized EDR data is further enriched with one or more new data fields to better correlate the EDR normalized data from the plurality of EDR tools. A plurality of alerts are then generated from the normalized and enriched data along one or more alert pathways to improve fidelity of the plurality of alerts. The plurality of alerts are correlated with the contextual information of the plurality of assets as well as information from other data sources to identify a set of incidents of suspicious activities.Type: ApplicationFiled: February 2, 2023Publication date: August 10, 2023Inventors: Jiaping Gui, Qi Wang, Zhichun Li, Peng Fei
-
Patent number: 11620492Abstract: Systems and methods for predicting road conditions and traffic volume is provided. The method includes generating a graph of one or more road regions including a plurality of road intersections and a plurality of road segments, wherein the road intersections are represented as nodes and the road segments are represented as edges. The method can also include embedding the nodes from the graph into a node space, translating the edges of the graph into nodes of a line graph, and embedding the nodes of the line graph into the node space. The method can also include aligning the nodes from the line graph with the nodes from the graph, and optimizing the alignment, outputting a set of node and edge representations that predicts the traffic flow for each of the road segments and road intersections based on the optimized alignment of the nodes.Type: GrantFiled: August 20, 2020Date of Patent: April 4, 2023Assignee: NEC CorporationInventors: Jiaping Gui, Zhengzhang Chen, Junghwan Rhee, Haifeng Chen, Pengyang Wang
-
Patent number: 11606389Abstract: Methods and systems for detecting and responding to an intrusion in a computer network include generating an adversarial training data set that includes original samples and adversarial samples, by perturbing one or more of the original samples with an integrated gradient attack to generate the adversarial samples. The original and adversarial samples are encoded to generate respective original and adversarial graph representations, based on node neighborhood aggregation. A graph-based neural network is trained to detect anomalous activity in a computer network, using the adversarial training data set. A security action is performed responsive to the detected anomalous activity.Type: GrantFiled: August 27, 2020Date of Patent: March 14, 2023Inventors: Zhengzhang Chen, Jiaping Gui, Haifeng Chen, Junghwan Rhee, Shen Wang
-
Patent number: 11522881Abstract: A computer-implemented method for graph structure based anomaly detection on a dynamic graph is provided. The method includes detecting anomalous edges in the dynamic graph by learning graph structure changes in the dynamic graph with respect to target edges to be evaluated in a given time window repeatedly applied to the dynamic graph. The target edges correspond to particular different timestamps. The method further includes predicting a category of each of the target edges as being one of anomalous and non-anomalous based on the graph structure changes. The method also includes controlling a hardware based device to avoid an impending failure responsive to the category of at least one of the target edges.Type: GrantFiled: August 13, 2020Date of Patent: December 6, 2022Inventors: Zhengzhang Chen, Jiaping Gui, Haifeng Chen, Lei Cai
-
Publication number: 20210067527Abstract: A computer-implemented method for graph structure based anomaly detection on a dynamic graph is provided. The method includes detecting anomalous edges in the dynamic graph by learning graph structure changes in the dynamic graph with respect to target edges to be evaluated in a given time window repeatedly applied to the dynamic graph. The target edges correspond to particular different timestamps. The method further includes predicting a category of each of the target edges as being one of anomalous and non-anomalous based on the graph structure changes. The method also includes controlling a hardware based device to avoid an impending failure responsive to the category of at least one of the target edges.Type: ApplicationFiled: August 13, 2020Publication date: March 4, 2021Inventors: Zhengzhang Chen, Jiaping Gui, Haifeng Chen, Lei Cai
-
Publication number: 20210067549Abstract: Methods and systems for detecting and responding to an intrusion in a computer network include generating an adversarial training data set that includes original samples and adversarial samples, by perturbing one or more of the original samples with an integrated gradient attack to generate the adversarial samples. The original and adversarial samples are encoded to generate respective original and adversarial graph representations, based on node neighborhood aggregation. A graph-based neural network is trained to detect anomalous activity in a computer network, using the adversarial training data set. A security action is performed responsive to the detected anomalous activity.Type: ApplicationFiled: August 27, 2020Publication date: March 4, 2021Inventors: Zhengzhang Chen, Jiaping Gui, Haifeng Chen, Junghwan Rhee, Shen Wang
-
Publication number: 20210064959Abstract: Systems and methods for predicting road conditions and traffic volume is provided. The method includes generating a graph of one or more road regions including a plurality of road intersections and a plurality of road segments, wherein the road intersections are represented as nodes and the road segments are represented as edges. The method can also include embedding the nodes from the graph into a node space, translating the edges of the graph into nodes of a line graph, and embedding the nodes of the line graph into the node space. The method can also include aligning the nodes from the line graph with the nodes from the graph, and optimizing the alignment, outputting a set of node and edge representations that predicts the traffic flow for each of the road segments and road intersections based on the optimized alignment of the nodes.Type: ApplicationFiled: August 20, 2020Publication date: March 4, 2021Inventors: Jiaping Gui, Zhengzhang Chen, Junghwan Rhee, Haifeng Chen, Pengyang Wang
-
Patent number: 10885027Abstract: Methods for querying a database and database systems include optimizing a database query for parallel execution using spatial and temporal information relating to elements in the database, the optimized database query being split into sub-queries with sub-queries being divided spatially according to host and temporally according to time window. The sub-queries are executed in parallel. The results of the database query are outputted progressively.Type: GrantFiled: August 23, 2017Date of Patent: January 5, 2021Inventors: Xusheng Xiao, Zhichun Li, Mu Zhang, Guofei Jiang, Jiaping Gui
-
Patent number: 10831750Abstract: Automated security systems and methods include a set monitored systems, each having one or more corresponding monitors configured to record system state information. A progressive software behavioral query language (PROBEQL) database is configured to store the system state information from the monitored systems. A query optimizing module is configured to optimize a database query for parallel execution using spatial and temporal information relating to elements in the PROBEQL database. The optimized database query is split into sub-queries with sub-queries being divided spatially according to host and temporally according to time window. A parallel execution module is configured to execute the sub-queries on the PROBEQL database in parallel. A results module is configured to output progressive results of the database query. A security control system is configured to perform a security control action in accordance with the progressive results.Type: GrantFiled: August 23, 2017Date of Patent: November 10, 2020Assignee: NEC CorporationInventors: Xusheng Xiao, Zhichun Li, Mu Zhang, Guofei Jiang, Jiaping Gui, Ding Li
-
Publication number: 20180060385Abstract: Methods for querying a database and database systems include optimizing a database query for parallel execution using spatial and temporal information relating to elements in the database, the optimized database query being split into sub-queries with sub-queries being divided spatially according to host and temporally according to time window. The sub-queries are executed in parallel. The results of the database query are outputted progressively.Type: ApplicationFiled: August 23, 2017Publication date: March 1, 2018Inventors: Xusheng Xiao, Zhichun Li, Mu Zhang, Guofei Jiang, Jiaping Gui
-
Publication number: 20180060586Abstract: Automated security systems and methods include a set monitored systems, each having one or more corresponding monitors configured to record system state information. A progressive software behavioral query language (PROBEQL) database is configured to store the system state information from the monitored systems. A query optimizing module is configured to optimize a database query for parallel execution using spatial and temporal information relating to elements in the PROBEQL database. The optimized database query is split into sub-queries with sub-queries being divided spatially according to host and temporally according to time window. A parallel execution module is configured to execute the sub-queries on the PROBEQL database in parallel. A results module is configured to output progressive results of the database query. A security control system is configured to perform a security control action in accordance with the progressive results.Type: ApplicationFiled: August 23, 2017Publication date: March 1, 2018Inventors: Xusheng Xiao, Zhichun Li, Mu Zhang, Guofei Jiang, Jiaping Gui