Search Results - Intelligence+%26+Security

85 Results

Sort By:

  1. Background Artificial intelligence (AI) image generation has opened up endless possibilities for creativity, allowing architects, designers, and artists to produce visual models rapidly. However, this technology is responsible for creating deepfakes, which are highly realistic but fake images and videos. Deepfakes can be used to spread misinformation,...
    Published: 2/13/2025
    Keywords(s):  
  2. Background Drones have provided significant improvements for industries including surveillance, research, and agriculture with their highly advanced aerial abilities. They provide enhanced safety and security measures and allow critical tasks to be completed remotely. Drones enable goods to be transported rapidly to remote areas with little infrastructure...
    Published: 2/13/2025
    Keywords(s):  
  3. Background In recent years, advancements in machine learning have revolutionized various domains, but concerns about bias and unfairness in automated decision-making systems have gained significant attention. One of the causes of unfairness in AI systems is the reliance on training data. Aleatoric uncertainty refers to the inherent randomness or variability...
    Published: 2/13/2025
    Inventor(s): Anique Tahir, Lu Cheng, Huan Liu
  4. When searching for missing persons, especially during emergency situations, such as catastrophic weather and infrastructure or geologic events, aerial reconnaissance can be an invaluable tool, particularly if the area is large and/or unstable. Unmanned aerial vehicles (UAVs) with thermal imaging capabilities can help detect heat signatures from victims,...
    Published: 2/13/2025
    Keywords(s):  
  5. Networks like those of healthcare infrastructure have been a primary target of cyberattacks for over a decade. From just a single cyberattack, a healthcare facility would expect to see millions of dollars in losses from legal fines, business interruption, and malpractice lawsuits. As more medical devices become interconnected, more cyber vulnerabilities...
    Published: 2/13/2025
  6. Cyber risk has emerged as a significant threat to businesses that have increasingly relied on new and existing information technologies. Across various businesses in different industries and sectors, a distinct pattern of IT network architectures, such as the client-server network architecture, may expose those businesses, which share it, to similar...
    Published: 2/13/2025
  7. Background One of the main problems that exists with protecting wildlife reserves and sanctuaries is effectively policing illegal poaching of animals. Current systems designed for this purpose are very expensive and use digital signal processing to try to match possible gunshot signals to existing masks. Due to the use of predetermined templates or...
    Published: 2/13/2025
    Inventor(s): Garth Paine
    Keywords(s):  
  8. Vital signs, such as heart and respiratory rate, provide critical insight into a person’s health. Radar has been used to remotely analyze and detect human activity and vital signs for many years. Despite all the great features such as motion sensitivity, privacy preservation, penetrability, and more, radar has limited spatial degrees of freedom...
    Published: 2/13/2025
    Keywords(s):  
  9. The architecture information of a Deep Neural Network (DNN) model is considered a valuable, sensitive piece of property for a company. Knowledge of a DNN’s exact architecture allows any adversary to build a substitute model and use this substitute model to launch devastating adversarial attacks. Side-channel based DNN architecture stealing can...
    Published: 2/13/2025
  10. Synthetic aperture sonar (SAS) is an active acoustic imaging technique that coherently combines data from a moving array to form high-resolution imagery, especially of underwater environments. The moving array in SAS collects both magnitude and phase information which allows coherent integration methods to achieve resolution parallel to the sensor...
    Published: 2/13/2025

Search Inventions

Looking for a technology or invention to commercialize? Arizona State University has more than 300 technologies available for licensing. Start your search here or submit your own invention.