Patents by Inventor Yonghong Huang

Yonghong Huang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210099474
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to perform malware detection using a generative adversarial network. An example apparatus includes a first encoder network to encode an input sample into a first encoded sample, the first encoder network implemented using a multilayer perception (MLP) network, a generator network to reconstruct the first encoded sample to generate a reconstructed sample, a discriminator network to, in response to obtaining the first encoded sample and the reconstructed sample, generate a loss function based on the reconstructed sample and the input sample, and an optimization processor to, when the loss function satisfies a threshold loss value, classify the input sample as malicious.
    Type: Application
    Filed: September 30, 2019
    Publication date: April 1, 2021
    Inventors: Yonghong Huang, Raj Vardhan, Celeste Fralick
  • Publication number: 20210014247
    Abstract: Methods, apparatus, systems and articles of manufacture for producing generic Internet Protocol (IP) reputation through cross-protocol analysis are disclosed. An example apparatus includes a data collector to gather a first data set representing IP telemetry data for a first protocol, the data collector to gather a second data set representing IP telemetry data for a second protocol different from the first protocol. A label generator is to generate a training data set based on records in the first data set and the second data set having matching IP addresses, the training data set to include combined label indicating whether each of the respective matching IP addresses is malicious. A model trainer is to train a machine learning model using the training data set. A model executor is to, responsive to a request from a client device, execute the machine learning model to determine whether a requested IP address is malicious.
    Type: Application
    Filed: July 9, 2019
    Publication date: January 14, 2021
    Inventors: Adam Wosotowsky, Yonghong Huang, Eric Peterson, John Wagener, Joanna Negrete, Armando Rodriguez, Celeste Fralick, Sandeep Chandana
  • Publication number: 20200327238
    Abstract: Embodiments discussed herein may be generally directed to systems and techniques to generate a quality score based on an observation and an action caused by an actor agent during a testing phase. Embodiments also include determining a temporal difference between the quality score and a previous quality score based on a previous observation and a previous action, determining whether the temporal difference exceeds a threshold value, and generating an attack indication in response to determining the temporal difference exceeds the threshold value.
    Type: Application
    Filed: June 24, 2020
    Publication date: October 15, 2020
    Applicant: INTEL CORPORATION
    Inventors: Shih-Han Wang, Yonghong Huang, Micah Sheller, Cory Cornelius
  • Patent number: 10726134
    Abstract: Embodiments discussed herein may be generally directed to systems and techniques to generate a quality score based on an observation and an action caused by an actor agent during a testing phase. Embodiments also include determining a temporal difference between the quality score and a previous quality score based on a previous observation and a previous action, determining whether the temporal difference exceeds a threshold value, and generating an attack indication in response to determining the temporal difference exceeds the threshold value.
    Type: Grant
    Filed: August 14, 2018
    Date of Patent: July 28, 2020
    Assignee: INTEL CORPORATION
    Inventors: Shih-Han Wang, Yonghong Huang, Micah Sheller, Cory Cornelius
  • Publication number: 20200210575
    Abstract: Methods and apparatus to detect adversarial malware are disclosed. An example adversarial malware detector includes a machine learning engine to classify a first feature representation representing features of a program as benign or malware, a feature perturber to, when the first feature representation is classified as benign, remove a first one of the features to form a second feature representation, and a decider to classify the program as adversarial malware when the machine learning engine classifies the second feature representation as malware.
    Type: Application
    Filed: December 28, 2018
    Publication date: July 2, 2020
    Inventors: Yonghong Huang, Raj Vardhan, Celeste R. Fralick, Gabriel G. Infante-Lopez, Dattatraya Kulkarni, Srikanth Nalluri, Sonam Bothra
  • Patent number: 10511600
    Abstract: Various embodiments are generally directed to an apparatus, method, and other techniques to maintain user authentications with common trusted devices. If a user is in possession of a first computing device (e.g., a smartphone), an unlocked state of the first trusted device is maintained if the user is using a nearby trusted device (e.g., a computer) within a certain amount of time. If the first trusted device is in a pocket or other container, a longer span of time is granted to the user to register an on-body state.
    Type: Grant
    Filed: January 8, 2018
    Date of Patent: December 17, 2019
    Assignee: Intel Corporation
    Inventors: Micah J. Sheller, Yonghong Huang, Narjala P. Bhasker, Jason Martin, Cory Cornelius
  • Patent number: 10218716
    Abstract: Technologies for analyzing a Uniform Resource Locator (URL) include a multi-stage URL analysis system. The multi-stage URL analysis system analyzes the URL using a multi-stage analysis. In the first stage, the multi-stage URL analysis system analyzes the URL using an ensemble lexical analysis. In the second stage, the multi-stage URL analysis system analyzes the URL based on third-party detection results. In the third stage, the multi-stage URL analysis system analyzes the URL based on metadata related to the URL. The multi-stage URL analysis system advances the stages of analysis if a malicious classification score determined by each stage does not satisfy a confidence threshold. The URL may also be selected for additional rigorous analysis using selection criteria not used in by the analysis stages.
    Type: Grant
    Filed: October 1, 2016
    Date of Patent: February 26, 2019
    Assignee: Intel Corporation
    Inventors: Yonghong Huang, Jason Martin, Micah J. Sheller, Cory Cornelius, Shih-han Wang
  • Publication number: 20190041223
    Abstract: An embodiment of a semiconductor package apparatus may include technology to acquire location related information, acquire local area characteristic information, and verify the location related information based on the local area characteristic information. Other embodiments are disclosed and claimed.
    Type: Application
    Filed: December 29, 2017
    Publication date: February 7, 2019
    Inventors: Liuyang Yang, Manoj Sastry, Yonghong Huang, Xiruo Liu, Noor Abani
  • Publication number: 20190042979
    Abstract: An embodiment of a semiconductor package apparatus may include technology to learn thermal behavior information of a system based on input information including one or more of processor information, thermal information, and cooling information, and provide information to adjust one or more of a parameter of a processor and a parameter of a cooling subsystem based on the learned thermal behavior information and the input information. Other embodiments are disclosed and claimed.
    Type: Application
    Filed: June 28, 2018
    Publication date: February 7, 2019
    Inventors: Raghuveer Devulapalli, Kelly Hammond, Yonghong Huang, Srinivas Pandruvada, Rahul Unnikrishnan Nair, Arjan Van De Ven, Denis Vladimirov, Qin Wang
  • Publication number: 20190042937
    Abstract: Methods, apparatus, systems and articles of manufacture for federated training of a neural network using trusted edge devices are disclosed. An example system includes an aggregator device to aggregate model updates provided by one or more edge devices. The one or more edge devices to implement respective neural networks, and provide the model updates to the aggregator device. At least one of the edge devices to implement the neural network within a trusted execution environment.
    Type: Application
    Filed: February 8, 2018
    Publication date: February 7, 2019
    Inventors: Micah Sheller, Cory Cornelius, Jason Martin, Yonghong Huang, Shih-Han Wang
  • Publication number: 20190042761
    Abstract: Embodiments discussed herein may be generally directed to systems and techniques to generate a quality score based on an observation and an action caused by an actor agent during a testing phase. Embodiments also include determining a temporal difference between the quality score and a previous quality score based on a previous observation and a previous action, determining whether the temporal difference exceeds a threshold value, and generating an attack indication in response to determining the temporal difference exceeds the threshold value.
    Type: Application
    Filed: August 14, 2018
    Publication date: February 7, 2019
    Inventors: Shih-Han Wang, Yonghong Huang, Micah Sheller, Cory Cornelius
  • Publication number: 20180359247
    Abstract: Various embodiments are generally directed to an apparatus, method, and other techniques to maintain user authentications with common trusted devices. If a user is in possession of a first computing device (e.g., a smartphone), an unlocked state of the first trusted device is maintained if the user is using a nearby trusted device (e.g., a computer) within a certain amount of time. If the first trusted device is in a pocket or other container, a longer span of time is granted to the user to register an on-body state.
    Type: Application
    Filed: January 8, 2018
    Publication date: December 13, 2018
    Applicant: INTEL CORPORATION
    Inventors: MICAH J. SHELLER, YONGHONG HUANG, NARJALA P. BHASKER, JASON MARTIN, CORY CORNELIUS
  • Publication number: 20180097822
    Abstract: Technologies for analyzing a Uniform Resource Locator (URL) include a multi-stage URL analysis system. The multi-stage URL analysis system analyzes the URL using a multi-stage analysis. In the first stage, the multi-stage URL analysis system analyzes the URL using an ensemble lexical analysis. In the second stage, the multi-stage URL analysis system analyzes the URL based on third-party detection results. In the third stage, the multi-stage URL analysis system analyzes the URL based on metadata related to the URL. The multi-stage URL analysis system advances the stages of analysis if a malicious classification score determined by each stage does not satisfy a confidence threshold. The URL may also be selected for additional rigorous analysis using selection criteria not used in by the analysis stages.
    Type: Application
    Filed: October 1, 2016
    Publication date: April 5, 2018
    Inventors: Yonghong Huang, Jason Martin, Micah J. Sheller, Cory Cornelius, Shih-han Wang
  • Patent number: 9866555
    Abstract: Various embodiments are generally directed to an apparatus, method, and other techniques to maintain user authentications with common trusted devices. If a user is in possession of a first computing device (e.g., a smartphone), an unlocked state of the first trusted device is maintained if the user is using a nearby trusted device (e.g., a computer) within a certain amount of time. If the first trusted device is in a pocket or other container, a longer span of time is granted to the user to register an on-body state.
    Type: Grant
    Filed: December 23, 2015
    Date of Patent: January 9, 2018
    Assignee: INTEL CORPORATION
    Inventors: Micah J. Sheller, Yonghong Huang, Narjala P. Bhasker, Jason Martin, Cory Cornelius
  • Publication number: 20170085565
    Abstract: Various embodiments are generally directed to an apparatus, method, and other techniques to maintain user authentications with common trusted devices. If a user is in possession of a first computing device (e.g., a smartphone), an unlocked state of the first trusted device is maintained if the user is using a nearby trusted device (e.g., a computer) within a certain amount of time. If the first trusted device is in a pocket or other container, a longer span of time is granted to the user to register an on-body state.
    Type: Application
    Filed: December 23, 2015
    Publication date: March 23, 2017
    Inventors: Micah J. Sheller, Yonghong Huang, Narjala P. Bhasker, Jason Martin, Cory Cornelius
  • Patent number: 8135148
    Abstract: An automatic gain control unit controls the gain applied to an input signal produced by a microphone subject to ambient noise. The automatic gain control circuit continually monitors the signal level of said input signal. A first gain control circuit decreases the gain applied to the input signal in increments of a first size when the input signal exceeds a first predetermined level. A second gain control circuit increases the gain applied to said input signal in increments of a smaller size when the input signal falls below a second predetermined level and in response to the presence of a speech present signal. The second predetermined level is less than said first predetermined level. In one embodiment, the first gain control circuit controls the analog gain of a codec and the second gain control circuit controls the digital gain of the codec.
    Type: Grant
    Filed: April 26, 2007
    Date of Patent: March 13, 2012
    Assignee: Microsemi Semiconductor Corp.
    Inventors: Gary Qu Jin, Yonghong Huang
  • Publication number: 20070262819
    Abstract: An automatic gain control unit controls the gain applied to an input signal produced by a microphone subject to ambient noise. The automatic gain control circuit continually monitors the signal level of said input signal. A first gain control circuit decreases the gain applied to the input signal in increments of a first size when the input signal exceeds a first predetermined level. A second gain control circuit increases the gain applied to said input signal in increments of a smaller size when the input signal falls below a second predetermined level and in response to the presence of a speech present signal. The second predetermined level is less than said first predetermined level. In one embodiment, the first gain control circuit controls the analog gain of a codec and the second gain control circuit controls the digital gain of the codec.
    Type: Application
    Filed: April 26, 2007
    Publication date: November 15, 2007
    Applicant: ZARLINK SEMICONDUCTOR INC.
    Inventors: Gary Qu Jin, Yonghong Huang