Jiangsu, China

Lili Bo

USPTO Granted Patents = 2 

Average Co-Inventor Count = 5.5

ph-index = 1


Company Filing History:


Years Active: 2025

Loading Chart...
2 patents (USPTO):Explore Patents

Title: Lili Bo - Innovator in Vulnerability Detection

Introduction

Lili Bo is a prominent inventor based in Jiangsu, China. She has made significant contributions to the field of vulnerability detection, holding 2 patents that showcase her innovative approach to addressing security challenges in software systems.

Latest Patents

One of her latest patents is the "Explainable vulnerability detection method and system based on dual-view causal reasoning." This method involves obtaining code samples, performing data augmentation, static analysis, and feature extraction to create a training data set. It establishes a vulnerability detection model through a hybrid contrastive learning method, ultimately outputting a vulnerability code and providing an explanation for the detection.

Another notable patent is the "Automatic event graph construction method and device for multi-source vulnerability information." This method includes crawling vulnerability reports from databases, identifying causes of vulnerabilities, and visualizing the obtained vulnerability event information into an event graph. This innovative approach enhances the understanding of vulnerabilities and their implications.

Career Highlights

Lili Bo is affiliated with Yangzhou University, where she continues to advance her research and development in the field of cybersecurity. Her work is instrumental in creating more robust systems that can effectively detect and explain vulnerabilities.

Collaborations

Lili collaborates with notable colleagues, including Xiaobing Sun and Bin Li, who contribute to her research endeavors and enhance the impact of her work.

Conclusion

Lili Bo's contributions to vulnerability detection through her innovative patents reflect her commitment to improving cybersecurity. Her work not only advances academic research but also has practical implications for enhancing software security.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…