Franklin Park, NJ, United States of America

Ding Li

USPTO Granted Patents = 10 

Average Co-Inventor Count = 5.0

ph-index = 2

Forward Citations = 12(Granted Patents)


Location History:

  • West Windsor, NJ (US) (2020 - 2021)
  • Franklin Park, NJ (US) (2021 - 2022)

Company Filing History:


Years Active: 2020-2022

Loading Chart...
10 patents (USPTO):

Title: The Innovative Contributions of Ding Li

Introduction

Ding Li is a prominent inventor based in Franklin Park, NJ, known for his significant contributions to the field of cybersecurity. With a total of 10 patents to his name, he has developed advanced methods for detecting malicious program behavior and enhancing threat detection systems.

Latest Patents

One of Ding Li's latest patents is focused on "Unknown malicious program behavior detection using a graph neural network." This method involves performing program verification based on system activity data and analyzing unverified program data to detect abnormal events. It utilizes a graph embedding approach through an attentional architecture to generate detection results and implement corrective actions based on those results. Another notable patent is for "Provenance-based threat detection tools and stealthy malware detection." This system builds a provenance graph from data obtained from computer systems and networks, sampling it to form linear paths and calculating regularity scores. It detects anomalies in these paths to identify and terminate malicious process activities.

Career Highlights

Ding Li has made remarkable strides in his career, particularly through his work at NEC Corporation. His innovative approaches have positioned him as a key figure in the development of advanced cybersecurity technologies.

Collaborations

Ding Li collaborates with talented individuals such as Zhichun Li and Kangkook Jee, contributing to the advancement of their shared goals in the field of cybersecurity.

Conclusion

Ding Li's work exemplifies the impact of innovation in cybersecurity, showcasing his dedication to developing effective solutions for detecting and mitigating threats. His contributions continue to shape the landscape of technology and security.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…