-
公开(公告)号:US11150878B2
公开(公告)日:2021-10-19
申请号:US15883786
申请日:2018-01-30
IPC分类号: G06F8/35 , G06F8/10 , G06F11/36 , G06F16/9032 , G06F8/36 , G06F16/35 , G06F40/289
摘要: A technique is described including taking a research paper of interest (target paper) and identifying concepts within it based on topic analysis among bibliometric clusters; identifying descriptions of each concept across bibliometric clusters wherein the descriptions will be of varying levels of granularity and will use different terms to describe the same concept or phenomena; using the various descriptions of a concept to create search terms to be used in a repository of annotated, searchable source code snippets; and constructing implementation of target paper's methodologies using source code snippets.
-
公开(公告)号:US10817797B1
公开(公告)日:2020-10-27
申请号:US16679126
申请日:2019-11-08
IPC分类号: G06N10/00 , G06F9/38 , H03K19/195
摘要: A method for characterizing an N-qubit process, for N an integer greater than 1. In some embodiments, the method includes performing a plurality of characterization measurements of the N-qubit process to form a plurality of process maps, and fitting the plurality of process maps with a composition of K-qubit processes, K being an integer greater than 1 and less than N.
-
33.
公开(公告)号:US10749882B2
公开(公告)日:2020-08-18
申请号:US15957221
申请日:2018-04-19
发明人: John Grothendieck , Ilana Heintz
摘要: Aspects are generally directed to network security systems and methods of monitoring network activity. In one example, a network security system includes and interface to receive a Hypertext Transfer Protocol (HTTP) network log that includes a matrix of data, a feature extraction component configured to extract a connectivity matrix from the HTTP network log based on a recurring pattern within the matrix of data, and a training module configured to provide deep learning architecture training data based on the connectivity matrix. The system may include a deep learning architecture configured to receive and propagate the training data through one or more layers thereof to train the one or more layers, and being configured to generate a general data representation of the HTTP network log. The system may include a behavior analytics component to detect a discordant network activity within the HTTP network log based on the general data representation.
-
34.
公开(公告)号:US20200252418A1
公开(公告)日:2020-08-06
申请号:US16444630
申请日:2019-06-18
IPC分类号: H04L29/06
摘要: A method of performing a security assessment of a system includes analyzing a static structure of the system; storing, in a semantic system model, structure information about the static structure of the system; observing the system during a plurality of discrete temporal system states; storing, in the semantic system model, dynamic information about the system during the plurality of discrete temporal system states; performing a semantic composition analysis on the structure information to identify at least one vulnerability of the system; performing a flow analysis on the dynamic information to identify at least one anomalous behavior of the system during at least one of the plurality of discrete temporal system states; and generating, based on the at least one vulnerability of the system and the at least one anomalous behavior of the system, a vulnerability assessment of the system.
-
公开(公告)号:US20200228538A1
公开(公告)日:2020-07-16
申请号:US16248211
申请日:2019-01-15
IPC分类号: H04L29/06
摘要: A system for performing security functions in a service-oriented computer system includes a router node configured to forward at least one packet of at least one service request to at least one server computer adapted to process the at least one service request; a first server node configured to execute, for the at least one packet, a first protocol layer of a network protocol stack, determine whether the at least one packet is compliant at the first protocol layer, and provide the at least one packet to a second server node responsive to determining that the at least one packet is compliant at the first protocol layer. The second server node is configured to execute, for the at least one packet, a second protocol layer of the network protocol stack, and determine whether the at least one packet is compliant at the second protocol layer.
-
公开(公告)号:US10649085B2
公开(公告)日:2020-05-12
申请号:US15783747
申请日:2017-10-13
发明人: Jonathan L. Habif
摘要: A method and apparatus for authenticating a radar return signal include: generating an outgoing radar beam; generating a pair of entangled photons comprising a signal photon and an idler photon; combining the signal photon with the outgoing radar beam to generate a combined beam; sending the combined beam towards a target; receiving a return beam; detecting the signal photon from the return beam by a quantum illumination receiver; and making a joint detection with the idler photon.
-
公开(公告)号:US20200136612A1
公开(公告)日:2020-04-30
申请号:US16558017
申请日:2019-08-30
摘要: A microwave switch. In some embodiments, the microwave switch includes a substrate, a signal conductor, a first ground conductor, on a first side of the signal conductor, and a second ground conductor, on a second side of the signal conductor. The signal conductor, the first ground conductor, and the second ground conductor may be planar conductors on a planar top surface of the substrate. The signal conductor may have a first portion composed of a superconducting material, and a second portion having a reduced cross section, a cross-sectional area of the second portion being less than 120 nm.
-
38.
公开(公告)号:US20190327252A1
公开(公告)日:2019-10-24
申请号:US15957221
申请日:2018-04-19
发明人: John Grothendieck , Ilana Heintz
摘要: Aspects are generally directed to network security systems and methods of monitoring network activity. In one example, a network security system includes and interface to receive a Hypertext Transfer Protocol (HTTP) network log that includes a matrix of data, a feature extraction component configured to extract a connectivity matrix from the HTTP network log based on a recurring pattern within the matrix of data, and a training module configured to provide deep learning architecture training data based on the connectivity matrix. The system may include a deep learning architecture configured to receive and propagate the training data through one or more layers thereof to train the one or more layers, and being configured to generate a general data representation of the HTTP network log. The system may include a behavior analytics component to detect a discordant network activity within the HTTP network log based on the general data representation.
-
公开(公告)号:US20190108344A1
公开(公告)日:2019-04-11
申请号:US15728469
申请日:2017-10-09
摘要: A system and method for detecting Trojans and other intermittent severe defects in a digital circuit design. A simulation of the digital circuit design results in a value change dump file, which is compiled to form a value change summary file containing counts of the numbers of value changes for the signals in the digital circuit design. A discriminative neural network analyzes the value change summary file to determine whether an intermittent severe defect is present. A corpus of digital circuit designs, with and without intermittent severe defects, is used to train the discriminative neural network. The training process may involve dimensionality reduction of the data, enlargement of the data set, and data compression using an autoencoder.
-
公开(公告)号:US10193722B2
公开(公告)日:2019-01-29
申请号:US14985099
申请日:2015-12-30
发明人: Saikat Guha
IPC分类号: H03M13/00 , H04L27/22 , H04B10/112 , H04B10/70 , H03M13/05
摘要: An optical receiver may include a unitary transformation operator to receive an n-symbol optical codeword associated with a codebook, and to perform a unitary transformation on the received optical codeword to generate a transformed optical codeword, where the unitary transformation is based on the codebook. The optical receiver may further include n optical detectors, where a particular one of the n optical detectors is to detect a particular optical symbol of the transformed optical codeword, and to determine whether the particular optical symbol corresponds to a first optical symbol or a second optical symbol. The optical receiver may also include a decoder to construct a codeword based on the determinations, and to decode the constructed codeword into a message using the codebook. The optical receiver may attain superadditive capacity, and, with an optimal code, may attain the Holevo limit to reliable communication data rates.
-
-
-
-
-
-
-
-
-