Taipei, Taiwan

Chiung-Ying Huang


 

Average Co-Inventor Count = 3.6

ph-index = 1

Forward Citations = 6(Granted Patents)


Location History:

  • Tapei Hsien, TW (2015)
  • New Taipei, TW (2018 - 2020)
  • Taipei, TW (2002 - 2024)

Company Filing History:


Years Active: 2002-2025

Loading Chart...
Loading Chart...
12 patents (USPTO):Explore Patents

Title: Innovations of Chiung-Ying Huang

Introduction

Chiung-Ying Huang is a prominent inventor based in Taipei, Taiwan. He has made significant contributions to the field of cybersecurity, particularly in the detection of information leakage and malicious domain names. With a total of 12 patents to his name, Huang's work is at the forefront of technological advancements in network security.

Latest Patents

Huang's latest patents include an "Information leakage detection method and device using the same." This method involves obtaining network connection data from an electronic device and extracting log data related to domain name system (DNS) requests. By analyzing these requests, the method identifies character distribution feature values that indicate whether a DNS request is malicious. His other notable patent is a "Detection method for malicious domain name in domain name system and detection device." This method captures log data related to domain names and utilizes a multi-type prediction model to determine the presence of malicious domain names associated with malware or phishing websites.

Career Highlights

Throughout his career, Chiung-Ying Huang has worked with notable companies such as Acer Cyber Security Incorporated and Acer Inc. His experience in these organizations has allowed him to develop and refine his innovative approaches to cybersecurity.

Collaborations

Huang has collaborated with esteemed colleagues, including Ming-Kung Sun and Zong-Cyuan Jhang. Their combined expertise has contributed to the advancement of cybersecurity technologies.

Conclusion

Chiung-Ying Huang's contributions to the field of cybersecurity through his innovative patents and collaborations highlight his importance as an inventor. His work continues to influence the development of methods for detecting information leakage and malicious activities in network systems.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…