-
1.
公开(公告)号:US20230422039A1
公开(公告)日:2023-12-28
申请号:US18035847
申请日:2021-11-08
Applicant: The Trustees of Princeton University
Inventor: Tanujay SAHA , Niraj K. JHA , Najwa AARAJ
IPC: H04W12/122 , H04L9/40 , G06N7/01
CPC classification number: H04W12/122 , H04L63/1433 , G06N7/01
Abstract: According to various embodiments, a method for detecting security vulnerabilities in a fifth generation core network (5GCN) is disclosed. The method includes constructing an attack graph from a plurality of regular expressions. Each regular expression corresponds to a sequence of system level operations for a known 5GCN attack. The method further includes performing a linear search on the attack graph to determine unexploited 5GCN attack vectors where path in the attack graph that does not represent a known 5GCN attack vector represents an unexploited 5GCN attack vector. The method also includes applying a trained machine learning module to the attack graph to predict new 5GCN attacks. The trained machine learning module is configured to determine a feasibility of linking unconnected nodes in the attack graph to create a new branch representing a new 5GCN vulnerability exploit.
-
公开(公告)号:US20250117552A1
公开(公告)日:2025-04-10
申请号:US18799055
申请日:2023-02-10
Applicant: The Trustees of Princeton University
Inventor: Prerit TERWAY , Niraj K. JHA
IPC: G06F30/27 , G06F111/06
Abstract: A design methodology and tool called INFORM are provided that use a two-phase approach for sample-efficient constrained multi-objective optimization of real-world nonlinear systems. In the first optional phase, one may modify a genetic algorithm (GA) to make the design process sample-efficient, and may inject candidate solutions into the GA population using inverse design methods. The inverse design techniques may be based on (i) a neural network verifier, (ii) a neural network, and (iii) a Gaussian mixture model. The candidate solutions for the next generation are thus a mix of those generated using crossover/mutation and solutions generated using inverse design. At the end of the first phase, one obtains a set of nondominated solutions. In the second phase, one chooses one or more solution(s) from the non-dominated solutions or another reference solution to further improve the objective function values using inverse design methods.
-
公开(公告)号:US20210133540A1
公开(公告)日:2021-05-06
申请号:US17058428
申请日:2019-03-14
Applicant: The Trustees of Princeton University
Inventor: Xiaoliang DAI , Hongxu YIN , Niraj K. JHA
Abstract: According to various embodiments, a method for generating an optimal hidden-layer long short-term memory (H-LSTM) architecture is disclosed. The H-LSTM architecture includes a memory cell and a plurality of deep neural network (DNN) control gates enhanced with hidden layers. The method includes providing an initial seed H-LSTM architecture, training the initial seed H-LSTM architecture by growing one or more connections based on gradient information and iteratively pruning one or more connections based on magnitude information, and terminating the iterative pruning when training cannot achieve a predefined accuracy threshold.
-
4.
公开(公告)号:US20230328094A1
公开(公告)日:2023-10-12
申请号:US18027765
申请日:2021-09-20
Applicant: The Trustees of Princeton University
Inventor: Jacob BROWN , Tanujay SAHA , Niraj K. JHA
IPC: H04L9/40
CPC classification number: H04L63/1433 , H04L63/1416 , H04L63/1425 , H04L63/1441
Abstract: According to various embodiments, a system for detecting security vulnerabilities in at least one of cyber-physical systems (CPSs) and Internet of Things (IoT) devices is disclosed. The system includes one or more processors configured to construct an attack directed acyclic graph (DAG) unique to each CPS or IoT device of the devices. The processors are further configured to generate an aggregate attack DAG from a classification of each device and a location of each device in network topology specified by a system administrator. The processors are also configured to calculate a vulnerability score and exploit risk score for each node in the aggregate attack DAG. The processors are further configured to optimize placement of defenses to reduce an adversary score of the aggregate attack DAG.
-
5.
公开(公告)号:US20230181120A1
公开(公告)日:2023-06-15
申请号:US17923958
申请日:2021-04-20
Applicant: The Trustees of Princeton University
Inventor: Shayan HASSANTABAR , Niraj K. JHA
IPC: A61B5/00 , G16H10/20 , G16H50/80 , A61B5/0205 , A61B5/0533
CPC classification number: A61B5/7267 , G16H10/20 , G16H50/80 , A61B5/0205 , A61B5/0533
Abstract: According to various embodiments, a machine-learning based system for coronavirus detection is disclosed. The system includes one or more processors configured to interact with a plurality of wearable medical sensors (WMSs). The processors are configured to receive physiological data from the WMSs and questionnaire data from a user interface. The processors are further configured to train at least one neural network based on raw physiological data and questionnaire data augmented with synthetic data and subjected to a grow-and-prune paradigm to generate at least one coronavirus inference model. The processors are also configured to output a coronavirus-based decision by inputting the received physiological data and questionnaire data into the generated coronavirus inference model.
-
公开(公告)号:US20210182683A1
公开(公告)日:2021-06-17
申请号:US16760209
申请日:2018-10-25
Applicant: The Trustees of Princeton University
Inventor: Xiaoliang DAI , Hongxu YIN , Niraj K. JHA
Abstract: According to various embodiments, a method for generating one or more optimal neural network architectures is disclosed. The method includes providing an initial seed neural network architecture and utilizing sequential phases to synthesize the neural network until a desired neural network architecture is reached. The phases include a gradient-based growth phase and a magnitude-based pruning phase.
-
公开(公告)号:US20250078998A1
公开(公告)日:2025-03-06
申请号:US18235422
申请日:2022-02-01
Applicant: The Trustees of Princeton University
Inventor: Shayan HASSANTABAR , Zhao ZHANG , Hongxu YIN , Niraj K. JHA
Abstract: According to various embodiments, a machine-learning based system for mental health disorder identification and monitoring is disclosed. The system includes one or more processors configured to interact with a plurality of wearable medical sensors (WMSs). The processors are configured to receive physiological data from the WMSs. The processors are further configured to train at least one neural network based on raw physiological data augmented with synthetic data and subjected to a grow-and-prune paradigm to generate at least one mental health disorder inference model. The processors are also configured to output a mental health disorder-based decision by inputting the received physiological data into the generated mental health disorder inference model.
-
8.
公开(公告)号:US20220222534A1
公开(公告)日:2022-07-14
申请号:US17613284
申请日:2020-03-20
Applicant: The Trustees of Princeton University
Inventor: Xiaoliang DAI , Hongxu YIN , Niraj K. JHA
Abstract: According to various embodiments, a method for generating a compact and accurate neural network for a dataset that has initial data and is updated with new data is disclosed. The method includes performing a first training on the initial neural network architecture to create a first trained neural network architecture. The method additionally includes performing a second training on the first trained neural network architecture when the dataset is updated with new data to create a second trained neural network architecture. The second training includes growing one or more connections for the new data based on a gradient of each connection, growing one or more connections for the new data and the initial data based on a gradient of each connection, and iteratively pruning one or more connections based on a magnitude of each connection until a desired neural network architecture is achieved.
-
公开(公告)号:US20220036150A1
公开(公告)日:2022-02-03
申请号:US17275949
申请日:2019-07-12
Applicant: The Trustees of Princeton University
Inventor: Shayan HASSANTABAR , Zeyu WANG , Niraj K. JHA
Abstract: According to various embodiments, a method for generating a compact and accurate neural network for a dataset is disclosed. The method includes providing an initial neural network architecture; performing a dataset modification on the dataset, the dataset modification including reducing dimensionality of the dataset; performing a first compression step on the initial neural network architecture that results in a compressed neural network architecture, the first compression step including reducing a number of neurons in one or more layers of the initial neural network architecture based on a feature compression ratio determined by the reduced dimensionality of the dataset; and performing a second compression step on the compressed neural network architecture, the second compression step including one or more of iteratively growing connections, growing neurons, and pruning connections until a desired neural network architecture has been generated.
-
公开(公告)号:US20180322092A1
公开(公告)日:2018-11-08
申请号:US16035258
申请日:2018-07-13
Inventor: Zhiguo GE , Xianmin CHEN , Niraj K. JHA , Naxin ZHANG
IPC: G06F15/78 , H04L12/775 , H04L12/801
CPC classification number: G06F15/7825 , H04L45/58 , H04L47/10
Abstract: Embodiments of the application provide device, method and system for routing global assistant signals in a NoC. The device comprises: a signal distributing element having an associated intermediate router provided in a system for routing global assistant signals in a NoC which includes at least one intermediate router electrically interposed between a source router and a destination router, wherein the signal distributing element is configured to: based on a predetermined criterion, select either local global assistant signals generated by the associated intermediate router or upstream global assistant signals received from an upstream router of the associated intermediate router as current global assistant signals to be sent to a downstream router of the associated intermediate router.
-
-
-
-
-
-
-
-
-