Patents by Inventor Shin-Ying HUANG

Shin-Ying HUANG has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230138458
    Abstract: A machine learning system and method are provided. The machine learning system includes a plurality of client apparatuses, and the client apparatuses include a first client apparatus and one or more second client apparatuses. The first client apparatus transmits a model update request to the one or more second client apparatuses, and the model update request corresponds to a malware type. The first client apparatus receives a second local model corresponding to each of the one or more second client apparatuses from each of the one or more second client apparatuses. The first client apparatus generates a plurality of node sequences based on a first local model and each of the second local models. The first client apparatus merges the first local model and each of the second local models based on the node sequences to generate a local model set.
    Type: Application
    Filed: November 24, 2021
    Publication date: May 4, 2023
    Inventors: Te-En Wei, Kun Wei Lee, Shin-Ying Huang, Hsiao-Hsien Chang, Jain-Shing Wu
  • Publication number: 20220179908
    Abstract: An information security device and method thereof are provided. The information security device includes a transceiver, a register and a processor. The transceiver configured to receive scenario information of a company; The register configured to store multiple instructions and multiple databases; and the processor coupled to the transceiver and the register, and configured to execute the multiple instructions to: read first vulnerability related information and first event information from the multiple databases; generate at least one first intelligent graph according to the first vulnerability related information and the first event information, and generate a second intelligent graph according to the scenario information; and compare the at least one first intelligent graph with the second intelligent graph to identify at least one similarity between the at least one first intelligent graph and the second intelligent graph for determining whether the company has information security threat.
    Type: Application
    Filed: December 3, 2020
    Publication date: June 9, 2022
    Inventors: Te-En WEI, Shin-Ying HUANG, Hsiao-Hsien CHANG, Jain-Shing WU