Shandong, China

Yanhan Wang


Average Co-Inventor Count = 7.0

ph-index = 1


Company Filing History:


Years Active: 2025

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Innovations of Yanhan Wang in Data Security

Introduction

Yanhan Wang is a notable inventor based in Shandong, China. He has made significant contributions to the field of information security, particularly in the detection of data stealthy attacks on networked systems. His innovative approach combines advanced techniques to ensure both data privacy and optimal system performance.

Latest Patents

Yanhan Wang holds a patent titled "Method for detecting data stealthy attack on networked system with differential privacy protection." This patent discloses a method that models a networked system and designs an attack detection scheme based on system noise parameters. The method also includes designing an optimal data stealthy attack scheme for an attacker according to known system information. Furthermore, it determines the moment of adding privacy noise through a scheduling scheme while ensuring the privacy of sensitive data. This innovative approach effectively detects potential data stealthy attacks while maintaining the integrity of system data privacy and performance. He has 1 patent to his name.

Career Highlights

Yanhan Wang is affiliated with the Shandong Computer Science Center, which is recognized as the National Supercomputer Center in Jinan. His work at this institution has allowed him to focus on cutting-edge research in information security and data protection.

Collaborations

Yanhan Wang has collaborated with notable colleagues, including Ming Yang and Fazong Wu, to advance research in his field. Their combined expertise contributes to the development of innovative solutions in data security.

Conclusion

Yanhan Wang's contributions to the field of information security through his innovative patent demonstrate his commitment to enhancing data protection in networked systems. His work is vital in addressing the challenges posed by data stealthy attacks while ensuring optimal system performance.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…