Patents by Inventor Yinglian Xie
Yinglian Xie has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11539716Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for online fraud protection. One of the methods includes receiving a query associated with a user account of an online service provider; providing the query to a deep neural network model to generate a prediction of whether the user account is fraudulent, wherein the deep neural network model is trained using anonymized event data for a collection of users received from one or more online service providers; and providing the prediction to the online service provider.Type: GrantFiled: July 30, 2019Date of Patent: December 27, 2022Assignee: DataVisor, Inc.Inventors: Cong A. Meng, Yuetong Wang, Yang Xu, Buodo Li, Ting-Fang Yen, Fang Yu, Yinglian Xie
-
Patent number: 11522873Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for detecting network attacks. One of the methods includes obtaining input data associated with a plurality of accounts associated with a particular entity; extracting features from the input data; performing unsupervised attack ring detection using the extracted features, wherein the unsupervised attack ring detection identifies suspicious clusters of accounts that have strong similarity or correlations in the high dimensional feature space; and generating an output for the detected attack rings.Type: GrantFiled: December 31, 2018Date of Patent: December 6, 2022Assignee: DataVisor, Inc.Inventors: Kuanyu Chu, Hongyu Cui, Arthur Meng, Zhong Wu, Yunfeng Xi, Yinglian Xie, Ting-Fang Yen, Fang Yu
-
Patent number: 11232364Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for rule generation and interaction. A rules engine is provided that does not require manual effort to generate or maintain high-quality rules over time for detecting malicious accounts or events. Rules no longer need to be manually added, tuned, or removed from the system. The system is able to determine the health of each rule and automatically add, tune, and remove rules to maintain a consistent, effective rule set.Type: GrantFiled: April 3, 2018Date of Patent: January 25, 2022Assignee: DataVisor, Inc.Inventors: Catherine Lu, Patrick Glenn Murray, Ming Qi, Shuo Shan, Yinglian Xie, Fang Yu, Yuhao Zheng
-
Patent number: 10771497Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for detecting malicious activities. One of the methods includes obtaining a collection of user event logs or receiving user events through real-time feeds; using data from the user event logs/feeds to determine IP address properties for individual IP addresses and IP address ranges; and for each incoming event, updating the IP address properties for the corresponding IP address and IP prefix properties.Type: GrantFiled: November 12, 2018Date of Patent: September 8, 2020Assignee: DataVisor, Inc.Inventors: Yinglian Xie, Fang Yu
-
Publication number: 20200045066Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for online fraud protection. One of the methods includes receiving a query associated with a user account of an online service provider; providing the query to a deep neural network model to generate a prediction of whether the user account is fraudulent, wherein the deep neural network model is trained using anonymized event data for a collection of users received from one or more online service providers; and providing the prediction to the online service provider.Type: ApplicationFiled: July 30, 2019Publication date: February 6, 2020Inventors: Cong A. Meng, Yuetong Wang, Yang Xu, Buodo Li, Ting-Fang Yen, Fang Yu, Yinglian Xie
-
Publication number: 20190207960Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for detecting network attacks. One of the methods includes obtaining input data associated with a plurality of accounts associated with a particular entity; extracting features from the input data; performing unsupervised attack ring detection using the extracted features, wherein the unsupervised attack ring detection identifies suspicious clusters of accounts that have strong similarity or correlations in the high dimensional feature space; and generating an output for the detected attack rings.Type: ApplicationFiled: December 31, 2018Publication date: July 4, 2019Inventors: Kuanyu Chu, Hongyu Cui, Arthur Meng, Zhong Wu, Yunfeng Xi, Yinglian Xie, Ting-Fang Yen, Fang Yu
-
Patent number: 10135788Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for detecting suspicious user activities. One of the methods includes generating hypergraphs, wherein the hypergraphs include nodes corresponding to feature profiles and edges between particular nodes representing a measure of similarity between nodes; using the generated hypergraphs to detect suspicious graph nodes; and using the suspicious graph nodes to detect malicious user communities.Type: GrantFiled: October 5, 2017Date of Patent: November 20, 2018Assignee: Data Visor Inc.Inventors: Yinglian Xie, Fang Yu
-
Patent number: 10129288Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for detecting malicious activities. One of the methods includes obtaining a collection of user event logs or receiving user events through real-time feeds; using data from the user event logs/feeds to determine IP address properties for individual IP addresses and IP address ranges; and for each incoming event, updating the IP address properties for the corresponding IP address and IP prefix properties.Type: GrantFiled: February 11, 2015Date of Patent: November 13, 2018Assignee: DataVisor Inc.Inventors: Yinglian Xie, Fang Yu
-
Patent number: 10110616Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for detecting suspicious users. One of the methods includes obtaining a collection of event logs or event feeds associated with a plurality of users to generate a collection of user properties; using the user properties to generate a plurality of groups of events; determining whether one or more groups are suspicious groups; and in response to a determination that one or more groups are suspicious, determining whether there are malicious accounts or events associated with each suspicious group.Type: GrantFiled: February 11, 2015Date of Patent: October 23, 2018Assignee: DataVisor Inc.Inventors: Yinglian Xie, Fang Yu
-
Patent number: 10098069Abstract: Mobile devices periodically send resource usage reports to an energy server. The reports include information such as an amount of energy used during a time interval, and identify processes that are executed on the mobile devices during the time interval. These reports are analyzed by the energy server and are used to generate statistics regarding the energy used by the mobile devices and the processes that are executed by the mobile devices. When a mobile device experiences a suspected energy spike, the mobile device generates and sends a report to the energy server. After confirming the energy spike, the energy server uses the statistics and the received report to identify one or more causes of the energy spike. The causes can include one or more processes, or the mobile device itself. The mobile device can reduce the amount of energy used based on the identified causes.Type: GrantFiled: February 6, 2014Date of Patent: October 9, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Ranveer Chandra, Omid Fatemieh, Parya Moinzadeh, Chandramohan A. Thekkath, Yinglian Xie
-
Publication number: 20180285745Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for rule generation and interaction. A rules engine is provided that does not require manual effort to generate or maintain high-quality rules over time for detecting malicious accounts or events. Rules no longer need to be manually added, tuned, or removed from the system. The system is able to determine the health of each rule and automatically add, tune, and remove rules to maintain a consistent, effective rule set.Type: ApplicationFiled: April 3, 2018Publication date: October 4, 2018Inventors: Catherine Lu, Patrick Glenn Murray, Ming Qi, Shuo Shan, Yinglian Xie, Fang Yu, Yuhao Zheng
-
Patent number: 10009358Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for detecting malicious attacks. One of the methods includes generating a collection of hypergraphs representing user events across a collection of users; analyzing the collection of hypergraphs to determine a group of malicious user accounts or account activities satisfying a threshold confidence; using the group of malicious user accounts or account activities as training data for a machine learning system that generates one or more classifiers; and using the one or more generated classifiers to output additional malicious user accounts or account activities.Type: GrantFiled: February 11, 2015Date of Patent: June 26, 2018Assignee: DataVisor Inc.Inventors: Yinglian Xie, Fang Yu
-
Patent number: 9787640Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for detecting suspicious user activities. One of the methods includes generating hypergraphs, wherein the hypergraphs include nodes corresponding to feature profiles and edges between particular nodes representing a measure of similarity between nodes; using the generated hypergraphs to detect suspicious graph nodes; and using the suspicious graph nodes to detect malicious user communities.Type: GrantFiled: February 11, 2015Date of Patent: October 10, 2017Assignee: DataVisor Inc.Inventors: Yinglian Xie, Fang Yu
-
Publication number: 20170279845Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for displaying information about computer network resources identified as engaging in malicious activities. One of the systems includes one or more computers including one or more processors and one or more memory devices, the one or more computers configured to: identify resources associated with an attack, and provide an attach resource dashboard user interface that displays information related to attack resources, wherein the user interface presents resource information comparing behavior of a particular resource at a single online service with behavior of the resource at other online services, and comparing the behavior of that resource with behavior of other resources.Type: ApplicationFiled: March 23, 2017Publication date: September 28, 2017Applicant: DataVisor Inc.Inventors: Yang-hua Chu, Patrick Glenn Murray, Shuo Shan, Yinglian Xie, Ting-Fang Yen, Fang Yu, Yuhao Zheng, Zilong Zhou
-
Publication number: 20170272453Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for presenting data to visualize and interact with results of a user analytics engine. One of the systems include one or more computers including one or more processors and one or more memory devices, the one or more computers configured to: identify fraudulent user accounts through analysis of obtained client data; and provide a campaign user interface that plots groups of fraudulent user accounts to visualize them as attack campaigns, rather than displaying by listing individual fraudulent user accounts.Type: ApplicationFiled: March 15, 2017Publication date: September 21, 2017Applicant: DataVisor Inc.Inventors: Patrick Glenn Murray, Shuo Shan, Zhong Wu, Yinglian Xie, Hui Xue, Fang Yu
-
Patent number: 9235396Abstract: A data partitioning plan is automatically generated that—given a data-parallel program and a large input dataset, and without having to first run the program on the input dataset—substantially optimizes performance of the distributed execution system that explicitly measures and infers various properties of both data and computation to perform cost estimation and optimization. Estimation may comprise inferring the cost of a candidate data partitioning plan, and optimization may comprise generating an optimal partitioning plan based on the estimated costs of computation and input/output.Type: GrantFiled: December 13, 2011Date of Patent: January 12, 2016Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Qifa Ke, Vijayan Prabhakaran, Yinglian Xie, Yuan Yu, Jingyue Wu, Junfeng Yang
-
Patent number: 9148434Abstract: A service log of a service provider is analyzed to identify IP addresses used by account holders that are populated IP addresses. Existing information about legitimate and malicious accounts of the service provider is leveraged to determine likely good and bad populated IP addresses based on the accounts that use the populated IP addresses. Features of the good and bad populated IP addresses are used to train a classifier that can identify good and bad populated IP addresses based on features of the populated IP addresses. The classifier may be used to provide security services to the same service provider or different service providers. The services include identifying malicious accounts.Type: GrantFiled: June 21, 2012Date of Patent: September 29, 2015Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Fang Yu, Yinglian Xie, Chi-Yao Hong
-
Publication number: 20150223172Abstract: Mobile devices periodically send resource usage reports to an energy server. The reports include information such as an amount of energy used during a time interval, and identify processes that are executed on the mobile devices during the time interval. These reports are analyzed by the energy server and are used to generate statistics regarding the energy used by the mobile devices and the processes that are executed by the mobile devices. When a mobile device experiences a suspected energy spike, the mobile device generates and sends a report to the energy server. After confirming the energy spike, the energy server uses the statistics and the received report to identify one or more causes of the energy spike. The causes can include one or more processes, or the mobile device itself. The mobile device can reduce the amount of energy used based on the identified causes.Type: ApplicationFiled: February 6, 2014Publication date: August 6, 2015Applicant: Microsoft CorporationInventors: Ranveer Chandra, Omid Fatemieh, Parya Moinzadeh, Chandramohan A. Thekkath, Yinglian Xie
-
Patent number: 8997220Abstract: Search result poisoning attacks may be automatically detected by identifying groups of suspicious uniform resource locators (URLs) containing multiple keywords and exhibiting patterns that deviate from other URLs in the same domain without crawling and evaluating the actual contents of each web page. Suspicious websites are identified and lexical features are extracted for each such website. The websites are clustered based on their lexical features, and group analysis is performed on each group to identify at least one suspicious group. Other implementations are directed to detecting a search engine optimization (SEO) attack by processing a large population of URLs to identify suspicious URLs based on the presence of a subset of keywords in each URL and the relative newness of each URL.Type: GrantFiled: May 26, 2011Date of Patent: March 31, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Fang Yu, Yinglian Xie, Martin Abadi, John P. John, Arvind Krishnamurthy
-
Patent number: 8856360Abstract: Dynamic IP addresses may be automatically identified and their dynamics patterns may be analyzed. Multi-user IP address blocks are determined as candidates for further analysis. An entropy score is determined for each IP address in every candidate block to distinguish between a dynamic IP and a static IP shared by multiple users. IP addresses with high entropy scores are grouped, and then analyzed, and may be used in various applications, such as spam filtering.Type: GrantFiled: June 22, 2007Date of Patent: October 7, 2014Assignee: Microsoft CorporationInventors: Kannan Achan, Eliot Gillum, Yinglian Xie, Fang Yu