Search Results - security

11 Results

Sort By:

  1. Background Adversarial purification is a defense mechanism for safe-guarding classifiers against adversarial attacks without knowing the type of attacks or training of the classifier. These techniques analyze and eliminate adversarial perturbations from the attacked inputs, and help to restore purified samples that retain similarity to the attacked...
    Published: 6/27/2025
  2. In the realm of quadrupedal locomotion, there's a growing interest in understanding the concept of passive leg stiffness. This stiffness, when tuned correctly, can significantly influence a robot's locomotion dynamics and performance. However, integrating passive stiffness into quadruped robots has been challenging due to complexities in design,...
    Published: 2/13/2025
    Inventor(s): Daniel Aukes, Fuchen Chen
    Category(s): Physical Science
  3. Cyber risk has emerged as a significant threat to businesses that have increasingly relied on new and existing information technologies. Across various businesses in different industries and sectors, a distinct pattern of IT network architectures, such as the client-server network architecture, may expose those businesses, which share it, to similar...
    Published: 2/13/2025
  4. The ubiquitous and heterogeneous deployment of internet of things (IoT) devices in smart homes has created new opportunities to extract knowledge, awareness, and intelligence via monitoring and understanding the devices’ interactions with their environments and users. Meaningful information from network traffic of IoT devices in smart homes can...
    Published: 2/13/2025
  5. Recently, the surge in Internet-of-things (IoT) device deployment within smart homes has led to a large need for understanding user activities through the vast data generated by these devices. While studies have explored individual device behaviors and network traffic patterns, there remains a gap in leveraging this data collectively to infer and monitor...
    Published: 2/13/2025
  6. There has been a rise in security breaches over the past few years, prompting an increasing need to mine insights from external discussion and social media platforms to raise alerts of possible attacks that might cater to specific industries. The dark web is one source of information on the internet where users can share information on software vulnerabilities...
    Published: 2/13/2025
  7. Radar systems transmit electromagnetic waves through the air and the objects in the aperture reflect the signal. The reflected signal is captured by the radar to find the position, angle, and velocity of each object. Millimeter-wave (mmWave) radar is a subclass of radar systems that uses millimeter waves to operate. The main advantage of mmWave radars...
    Published: 2/13/2025
  8. Mobile augmented reality (MAR) is a portable implementation of augmented reality (AR) that enables real-time interaction between digital content and the actual, physical world. Recently, it has been implemented in mobile applications (i.e., mobile augmented reality applications or MAR-Apps) accessible through smartphones, tablets, etc. However, even...
    Published: 2/13/2025
  9. Protecting mobile devices from unauthorized access is becoming more than indispensable these days. In particular, mobile devices such as smartphones and tablets are pervasive and store increasingly highly sensitive information about a user (e.g., contacts, usernames, passwords, emails, browser histories, business secrets, health conditions, etc.)....
    Published: 2/13/2025
    Inventor(s): Yimin Chen, Yanchao Zhang
  10. ­Background Growing applications of generative models have led to new threats such as malicious personation and digital copyright infringement. One solution to these threats is model attribution, i.e., the identification of user-end models where the contents under question are generated from. Existing studies showed empirical feasibility of attribution...
    Published: 2/13/2025
    Keywords(s): Security

Search Inventions

Looking for a technology or invention to commercialize? Arizona State University has more than 300 technologies available for licensing. Start your search here or submit your own invention.