Patents by Inventor Lily Yang

Lily Yang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220240168
    Abstract: A computing node to implement a management entity in a CP-based network. The node including processing circuitry configured to encode an inquiry message requesting information on CPS capabilities. Response messages are received from a set of sensing nodes of a plurality of sensing nodes in response to the inquiry message. The response messages include the information on the CPS capabilities of the set of sensing nodes. A notification message indicating selecting of a sensing node as a sensing coordinator is encoded for transmission. Sensed data received in a broadcast message from the sensing coordinator is decoded. The sensed data including data associated with one or more non-V2X capable sensing nodes.
    Type: Application
    Filed: September 23, 2021
    Publication date: July 28, 2022
    Inventors: Vallabhajosyula S. Somayazulu, Rath Vannithamby, Kathiravetpillai Sivanesan, Markus Dominik Mueck, Leonardo Gomes Baltar, Marcio Rogerio Juliato, Liuyang Lily Yang, Manoj R. Sastry, Shabbir Ahmed, Christopher Gutierrez, Vuk Lesi, Qian Wang
  • Patent number: 11389549
    Abstract: The present invention provides a 19F-MR/fluorescence multi-mode molecular imaging and drug loading diagnosis-treatment integrated nanoprobe, and a preparation method and an application. The nano-probe is a nanoparticle formed by coating a mixture of a surfactant containing a molecular targeting treatment drug and a fluorescent dye with a Perfluorocarbon (PFC) carrier; and by uniformly dispersing a mixed solution into water and glycerol, processing ultrasonically, removing a component which is not effectively coated, and purifying, the drug-loading nanoparticle capable of being used for 19 F-MR imaging may be prepared.
    Type: Grant
    Filed: April 23, 2020
    Date of Patent: July 19, 2022
    Assignee: Harbin Medical University
    Inventors: Xilin Sun, Lina Wu, Jie Yang, Kai Wang, Lili Yang, Haoxiang Li, Yingbo Li, Xiaona Li, Shuang Liu
  • Publication number: 20220225227
    Abstract: System and techniques for network slice resiliency are described herein. An indication of a fault-attack-failure-outage (FAFO) event for a network slice may be received. Here, the network slice is one of multiple network slices. A capacity in a slice segment may be estimated to determine whether there is enough capacity to meet a service level agreement (SLA) of the multiple network slices based on the FAFO event. In this case, the slice segment is a set of physical resources shared by the multiple network slices. Operation of the slice segment may then be modified based on results from estimating the capacity in the slice segment to address impacts from the FAFO event.
    Type: Application
    Filed: April 1, 2022
    Publication date: July 14, 2022
    Inventors: Satish Chandra Jha, S M Iftekharul Alam, Vesh Raj Sharma Banjade, Ned M. Smith, Arvind Merwaday, Kshitij Arun Doshi, Francesc Guim Bernat, Liuyang Lily Yang, Kuilin Clark Chen, Christian Maciocco, Marcio Rogerio Juliato, Maruti Gupta Hyde, Manoj R. Sastry
  • Publication number: 20220211757
    Abstract: Aspects of the present disclosure relate to methods and compositions related to the preparation of immune cells, including engineered T cells comprising at least one exogenous ?? T cell receptor, for example one that is selected to target a specific disease or pathogen (e.g., cancer or COVID-19). The T cells may be produced from human hematopoietic stem/progenitor cells and are suitable for allogeneic cellular therapy because they do not induce graft-versus-host disease (GvHD) and resist host immune allorejection. Consequently, such cells are suitable for off-the-shelf use in clinical therapy.
    Type: Application
    Filed: December 28, 2021
    Publication date: July 7, 2022
    Applicant: The Regents of the University of California
    Inventors: Lili Yang, Derek Lee, Yang Zhou, Zhe Li
  • Publication number: 20220204833
    Abstract: The invention relates to the technical field of oil and gas drilling, and discloses an amphiphilic block polymer ultralow-permeability agent and an intelligent temporary plugging type water-based drilling fluid. The ultralow-permeability agent contains a structural unit provided by styryl hydrophobic monomer, maleic anhydride and acrylamide; the drilling fluid contains two or more of water, sodium bentonite, Pac-Lv, the ultralow-permeability agent, calcium carbonate, one-way plugging agent, white asphalt and barite which are stored in a mixed manner or independently stored.
    Type: Application
    Filed: March 16, 2022
    Publication date: June 30, 2022
    Applicant: China University of Petroleum (Beijing)
    Inventors: Yinbo He, Guancheng Jiang, Lili Yang, Tengfei Dong, Bin Tan, Rongchao Cheng, He Shi, Jianguo Zhang, Tie Geng, Jiansheng Luo, Dongmin Jia, Kai Wang, Chunlin Xie, Wuquan Li, Xiaoqing Li
  • Publication number: 20220201001
    Abstract: A system and method for authenticating users of a data processing platform stores a mapping of a unique user platform identifier to multiple user identity provider identifiers associated with multiple realms for a same user. In some examples, the method includes receiving a request from a client device to establish an access session to perform one or more actions on data of the data processing platform and receiving, from at least one of the first external identity provider of the first realm or the second external identity provider of the second realm, a user identity provider identifier associated with the request. In certain examples, the method includes granting permission to perform the one or more actions on the data of the data processing platform based at least in part on the received user identity provider identifier.
    Type: Application
    Filed: March 14, 2022
    Publication date: June 23, 2022
    Inventors: Lili Yang, Mark Elliot, Lam Tran, Robert Kruszewski, Divyanshu Arora
  • Publication number: 20220193117
    Abstract: This disclosure relates to hyaluronic acid nanoparticles containing an anticancer agent such as a NADPH oxidase (NOX) inhibitor for targeted delivery to cancerous cells or tumors. In certain embodiments, the nanoparticles are made up of hyaluronic acid conjugated to hydrophobic moieties. In certain embodiments, the hydrophobic moieties are steroid based compounds, such as 5beta-cholanic acid.
    Type: Application
    Filed: April 1, 2020
    Publication date: June 23, 2022
    Inventors: Lily Yang, Lei Zhu
  • Publication number: 20220191648
    Abstract: Systems and techniques for digital twin framework for next generation networks are described herein. A digital twin model may be generated for physical nodes of an edge network. The digital twin model may include a digital twin for a physical node of the physical nodes. An error may be identified of the physical node or the digital twin for the physical node. The digital twin model may be updated to halt communication with the physical node or the digital twin of the physical node. A path may be created to another physical node or a digital twin of the another physical node in the digital twin model.
    Type: Application
    Filed: December 20, 2021
    Publication date: June 16, 2022
    Inventors: Ned M. Smith, S M Iftekharul Alam, Vesh Raj Sharma Banjade, Satish Chandra Jha, Liuyang Lily Yang, Christian Maciocco, Nageen Himayat, Arvind Merwaday, Francesc Guim Bernat, Kshitij Arun Doshi
  • Publication number: 20220147643
    Abstract: Systems and methods generate a first security node hash identifier by performing a first hash operation, such as a one-way hash, on a first data resource identifier associated with a first data resource, such as a data set, produced by a data resource platform. The systems and methods generate a dependent second security node hash identifier by performing a second hash operation on a second data resource identifier associated with a dependent second data resource produced by the data resource platform and on the first security node hash identifier, receive an access request for access to the dependent second data resource; and in response to the access request, grant permission to access the dependent second data resource to a user associated with the access request based on the dependent second security node hash identifier.
    Type: Application
    Filed: January 24, 2022
    Publication date: May 12, 2022
    Inventors: Lam Tran, James Baker, Lili Yang
  • Patent number: 11326450
    Abstract: The embodiments of the invention provide an intelligent prediction method and apparatus for reservoir sensitivity, belonging to the technical field of reservoir sensitivity prediction. The method includes: acquiring a reservoir sensitivity influence factor item related to a reservoir sensitivity result to be predicted and numerical values of corresponding reservoir sensitivity influence factors; determining a corresponding type of database according to the reservoir sensitivity influence factor item; determining whether numerical values of reservoir sensitivity influence factors corresponding to core parameters in the numerical values of the reservoir sensitivity influence factors include a first upper boundary value or a first lower boundary value; and using, according to whether the first upper boundary value or the first lower boundary value is included, different intelligent sensitivity prediction models to calculate the reservoir sensitivity result to be predicted.
    Type: Grant
    Filed: June 11, 2021
    Date of Patent: May 10, 2022
    Assignee: China University of Petroleum (Beijing)
    Inventors: Guancheng Jiang, Xiongjun Wu, Lili Yang, Yinbo He, Tengfei Dong, Xiaohu Quan, Chunyao Peng, Xuwu Luo, Bin Tan, Jun Cai, Xing Liang, Zhiliang You, Yong Wang, Bin Li, Yongbin Guo, Shen Guan
  • Publication number: 20220124503
    Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed to detect attacks in V2X networks. An example apparatus includes a challenge handler to (a) transmit a first challenge packet to a first vehicle to request a transmission of a first response, (b) instruct a second challenge packet to be transmitted to a second vehicle to request a transmission of a second response, (c) increment a first counter when the first response is not obtained, (d) increment a second counter when the second response is not obtained, and (e) after repeating (a)-(d), determine that the first and second vehicles are phantom vehicles associated with an attacker with a half-duplex radio when at least one of the first or second counters satisfy a threshold, and a network interface to instruct a third vehicle associated with the V2X network to ignore future messages from the phantom vehicles based on the determination.
    Type: Application
    Filed: December 8, 2021
    Publication date: April 21, 2022
    Inventors: Liuyang Lily Yang, Debabani Choudhury, Sridhar Sharma, Kathiravetpillai Sivanesan, Justin Gottschlich, Zheng Zhang, Yair Yona, Xiruo Liu, Moreno Ambrosin, Kuilin Clark Chen
  • Publication number: 20220116335
    Abstract: A computing node includes network interface circuitry and processing circuitry. The processing circuitry assigns available computing resources to a plurality of slice contexts. Each slice context of the plurality includes resource allocations of the available computing resources associated with multiple communication networks. A first portion of the resource allocations is designated as dedicated resources and a second, remaining portion is designated as shared resources. A FAFO event associated with a workload is detected. The workload executes on a network slice instance (NSI) associated with a slice context of a subset of slice contexts. The configuration of the NSI is restored to a pre-FAFO event state based on reconfiguring one or both of the dedicated resources or the shared resources of the slice context based on the resource allocations of at least a second slice context in the subset of slice contexts.
    Type: Application
    Filed: December 21, 2021
    Publication date: April 14, 2022
    Inventors: Vesh Raj Sharma Banjade, Satish Chandra Jha, Ned M. Smith, S M Iftekharul Alam, Christian Maciocco, Liuyang Lily Yang, Mona Vij, Kshitij Arun Doshi, Francesc Guim Bernat, Clark Chen
  • Patent number: 11303644
    Abstract: A system and method for authenticating users of a data processing platform stores a mapping of a unique user platform identifier to multiple user identity provider identifiers associated with multiple realms for a same user. In some examples, the method includes receiving a request from a client device to establish an access session to perform one or more actions on data of the data processing platform and receiving, from at least one of the first external identity provider of the first realm or the second external identity provider of the second realm, a user identity provider identifier associated with the request. In certain examples, the method includes granting permission to perform the one or more actions on the data of the data processing platform based at least in part on the received user identity provider identifier.
    Type: Grant
    Filed: October 24, 2019
    Date of Patent: April 12, 2022
    Assignee: Palantir Technologies Inc.
    Inventors: Lili Yang, Mark Elliot, Lam Tran, Robert Kruszewski, Divyanshu Arora
  • Patent number: 11263336
    Abstract: Systems and methods generate a first security node hash identifier by performing a first hash operation, such as a one-way hash, on a first data resource identifier associated with a first data resource, such as a data set, produced by a data resource platform. The systems and methods generate a dependent second security node hash identifier by performing a second hash operation on a second data resource identifier associated with a dependent second data resource produced by the data resource platform and on the first security node hash identifier, receive an access request for access to the dependent second data resource; and in response to the access request, grant permission to access the dependent second data resource to a user associated with the access request based on the dependent second security node hash identifier.
    Type: Grant
    Filed: January 3, 2020
    Date of Patent: March 1, 2022
    Assignee: Palantir Technologies Inc.
    Inventors: Lam Tran, James Baker, Lili Yang
  • Publication number: 20220049148
    Abstract: An ultralow-permeability agent contains a structural unit provided by styryl hydrophobic monomer, maleic anhydride and acrylamide; the drilling fluid contains two or more of water, sodium bentonite, Pac-Lv, the ultralow-permeability agent, calcium carbonate, one-way plugging agent, white asphalt and barite which are stored in a mixed manner or independently stored. When the amphiphilic block polymer provided by the invention is used as the ultralow-permeability agent of the intelligent temporary plugging type water-based drilling fluid, the self-adaptive characteristic is realized; according to the amphiphilic block polymer, temporary plugging layer gaps formed in pore and throats by plugging materials in drilling fluid can be fully filled under the condition that the sizes and the distribution of the pore and throats of reservoirs are not required to be clear, so that the permeability of temporary plugging layer is greatly reduced, ultralow-permeability is realized.
    Type: Application
    Filed: June 17, 2021
    Publication date: February 17, 2022
    Applicant: China University of Petroleum (Beijing)
    Inventors: Yinbo HE, Guancheng JIANG, Lili YANG, Tengfei DONG, Bin TAN, Rongchao CHENG, He SHI, Jianguo ZHANG, Tie GENG, Jiansheng LUO, Dongmin JIA, Kai WANG, Chunlin XIE, Wuquan LI, Xiaoqing LI
  • Patent number: 11252567
    Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed to detect attacks in V2X networks. An example apparatus includes a challenge handler to (a) transmit a first challenge packet to a first vehicle to request a transmission of a first response, (b) instruct a second challenge packet to be transmitted to a second vehicle to request a transmission of a second response, (c) increment a first counter when the first response is not obtained, (d) increment a second counter when the second response is not obtained, and (e) after repeating (a)-(d), determine that the first and second vehicles are phantom vehicles associated with an attacker with a half-duplex radio when at least one of the first or second counters satisfy a threshold, and a network interface to instruct a third vehicle associated with the V2X network to ignore future messages from the phantom vehicles based on the determination.
    Type: Grant
    Filed: December 21, 2018
    Date of Patent: February 15, 2022
    Assignee: Intel Corporation
    Inventors: Liuyang Lily Yang, Debabani Choudhury, Sridhar Sharma, Kathiravetpillai Sivanesan, Justin Gottschlich, Zheng Zhang, Yair Yona, Xiruo Liu, Moreno Ambrosin, Kuilin Clark Chen
  • Publication number: 20220015140
    Abstract: Various systems and methods for implementing random access channel security are described herein. An apparatus for a base station includes: receiver circuitry to receive at the base station, a signal from a user equipment (UE) transmitter to access resources of the base station; statistics circuitry to calculate high-order statistics on the signal to produce an identification indication; a memory device to store the high-order statistics and the identification indication; and processing circuitry to: associate the identification indication with the UE transmitter; use the identification indication to determine that multiple failures of a random access channel (RACH) process have occurred from the UE transmitter; and restrict later attempts by the UE transmitter to perform RACH processes with the base station.
    Type: Application
    Filed: September 23, 2021
    Publication date: January 13, 2022
    Inventors: Rath Vannithamby, Kathiravetpillai Sivanesan, Liuyang Lily Yang, Christian Maciocco
  • Publication number: 20220014549
    Abstract: Systems and techniques for misbehavior processing in connected vehicle networks such as a vehicle-to-everything (V2X) communication environment are described herein. A misbehavior report may be received by a local misbehavior agent from a node operating on a vehicle communication network. The local misbehavior agent may be responsible for a geographic area in which the node is located. The misbehavior report may be corroborated using the misbehavior report and evidence of misbehavior of a subject node of the misbehavior report. A revocation recommendation may be generated for the subject node based on the corroboration. The revocation recommendation may be transmitted to a misbehavior authority operating on the vehicle communication network.
    Type: Application
    Filed: September 23, 2021
    Publication date: January 13, 2022
    Inventors: Liuyang Lily Yang, Manoj R. Sastry, Kathiravetpillai Sivanesan, Marcio Rogerio Juliato
  • Publication number: 20220014923
    Abstract: Various aspects of methods, systems, and use cases include region identification of a malicious device based on crowdsourced locations. A method may include generating a grid of bins of a local radio coverage region, receiving location data from a plurality of devices in the local radio coverage region, and classifying locations of the plurality of devices with respect to the bins. The method may include associating the classified locations of the plurality of devices to the received location data for corresponding devices of the plurality of devices, and generating a model, from the associated classified locations and the received location data.
    Type: Application
    Filed: September 24, 2021
    Publication date: January 13, 2022
    Inventors: Vesh Raj Sharma Banjade, Satish Chandra Jha, Kathiravetpillai Sivanesan, Liuyang Lily Yang, Ned M. Smith, S M Iftekharul Alam, Arvind Merwaday, Francesc Guim Bernat, Kshitij Arun Doshi, Kuilin Clark Chen
  • Publication number: 20210388720
    Abstract: The embodiments of the invention provide an intelligent prediction method and apparatus for reservoir sensitivity, belonging to the technical field of reservoir sensitivity prediction. The method includes: acquiring a reservoir sensitivity influence factor item related to a reservoir sensitivity result to be predicted and numerical values of corresponding reservoir sensitivity influence factors; determining a corresponding type of database according to the reservoir sensitivity influence factor item; determining whether numerical values of reservoir sensitivity influence factors corresponding to core parameters in the numerical values of the reservoir sensitivity influence factors include a first upper boundary value or a first lower boundary value; and using, according to whether the first upper boundary value or the first lower boundary value is included, different intelligent sensitivity prediction models to calculate the reservoir sensitivity result to be predicted.
    Type: Application
    Filed: June 11, 2021
    Publication date: December 16, 2021
    Applicant: China University of Petroleum (Beijing)
    Inventors: Guancheng JIANG, Xiongjun WU, Lili YANG, Yinbo HE, Tengfei DONG, Xiaohu QUAN, Chunyao PENG, Xuwu LUO, Bin TAN, Jun CAI, Xing LIANG, Zhiliang YOU, Yong WANG, Bin LI, Yongbin GUO, Shen GUAN