# of Displayed Technologies: 3 / 3

Applied Category Filter (Click To Remove): Communications & Networking


Categories

Counterattacking Smart Contract Exploits: An Active Defense Approach
TS-063027 — The Need Smart contracts have revolutionized the way transactions are conducted, but their unique nature makes them susceptible to exploitation. Despite extensive efforts in vulnerability identification, exploitable vulnerabilities persist, resulting in substantial financial losses. To mitigate thi…
  • College: College of Engineering (COE)
  • Inventors: Lin, Zhiqiang; Morales, Marcelo
  • Licensing Officer: Mess, David

3DScope: Detecting 3D Model Clones
TS-057129 — Algorithm for extracting 3D models, indexing them using a value-insensitive normalization algorithm, and comparing the model indexes to detect cloned 3D models.
The unauthorized copying of 3D models robs designers of property, reduces innovation going into the creation of 3D models, creates liability for entities unknowingly using copied models, and indicates a lapse in IP security. With the vast amount of 3D assets in use, it is infeasible for humans to …
  • College: College of Engineering (COE)
  • Inventors: Zuo, Chaoshun; Lin, Zhiqiang
  • Licensing Officer: Mess, David

Protecting Bluetooth Low Energy from Address Tracking When Using Whitelisting
TS-052807 — Bluetooth Low Energy (BLE) is ubiquitous today due to its extremely low energy consumption and relatively large communication coverage. However, the devices communicated through Bluetooth are subject to address tracking attacks, where a nearby attacker can associate Bluetooth addresses to particul…
  • College: College of Engineering (COE)
  • Inventors: Lin, Zhiqiang; Zhang, Yue
  • Licensing Officer: Mess, David

Loading icon