Gustavo de los Reyes - Fair Haven NJ, US Gang Xu - Piscataway NJ, US
Assignee:
AT&T Intellectual Property I, L.P. - Atlanta GA
International Classification:
G01C 21/34 G08G 1/01
US Classification:
701118, 701410, 4554565
Abstract:
A cellular-based live traffic service that does not require pre-deployment of infrastructure or GPS-enabled devices uses signals provided by cellular devices to determine course resolution localization and tracking information of the cellular devices. Specialized statistical analysis is performed on the course resolution data to infer the fine resolution positions of the cellular devices. In an example embodiment, the localization and tracking information is provided on a map, or the like, to show relative position and/or trajectory of cellular devices.
Methods, Devices, Systems, And Computer Program Products For Edge Driven Communications Network Security Monitoring
Gustavo de los Reyes - Fair Haven NJ, US Thusitha Jayawardena - Holmdel NJ, US Gang Xu - Piscataway NJ, US
Assignee:
AT&T Intellectual Property I, L.P. - Reno NV
International Classification:
G06F 21/00
US Classification:
726 22, 713188, 726 24
Abstract:
An edge monitoring approach can be utilized to detect an attack which includes a plurality of relatively low bandwidth attacks, which are aggregated at a victim sub-network. The aggregated low bandwidth attacks can generate a relatively high bandwidth attack including un-solicited data traffic directed to the victim' so that the aggregated attack becomes more detectable at an edge monitor circuit located proximate to the victim. Related systems, devices, and computer program products are also disclosed.
Method And System For Controlling Physical Components Via A Virtual Environment
Gustavo De Los Reyes - Fair Haven NJ, US Sanjay MacWan - Marlboro NJ, US Gang Xu - Piscataway NJ, US Howard Shirokmann - Point Pleasant NJ, US Rachel Rosencrantz - Boulder CO, US Thusitha Jayawardena - Holmdel NJ, US
Assignee:
AT & T Intellectual Property, LP. - Atlanta GA
International Classification:
G06F 3/048
US Classification:
715771
Abstract:
A computer readable storage medium storing a set of instructions that are executable by a processor, the set of instructions being operable to store a virtual representation of a plurality of physical components, display the virtual representation, receive user interaction with at least one of the virtual representations and send a command to the physical component corresponding to the user interaction.
Methods And Apparatus To Enhance Security In Residential Networks
Thusitha Jayawardena - Holmdel NJ, US Gustavo De Los Reyes - Fair Haven NJ, US Gang Xu - Piscataway NJ, US
International Classification:
G06F 17/00 G06F 15/16
US Classification:
726 12
Abstract:
Example methods and apparatus to enhance security in residential networks and residential gateways are disclosed. A disclosed example apparatus includes a transceiver to receive an Internet protocol (IP) packet, a first packet processing module associated with a protected IP address, the first packet processing module to be communicatively coupled to a first network device, a second packet processing module associated with a public IP address, the second packet processing module to be communicatively coupled to a second network device, and a packet diverter to route the received IP packet to the first packet processing module when the IP packet contains the protected IP address and to route the IP packet to the second packet processing module when the IP packet does not contain the protected IP address.
Method And System For Dynamic Traffic Prioritization
Thusitha JAYAWARDENA - Holmdel NJ, US Gustavo de los REYES - Fair Haven NJ, US Xiao PAN - Middletown NJ, US Gang XU - Piscataway NJ, US
Assignee:
AT&T INTELLECTUAL PROPERTY I, L.P. - Reno NV
International Classification:
H04L 12/26
US Classification:
370238
Abstract:
A method provides for the dynamic traffic prioritization in a communication network. The method electronically monitors traffic in a communication network and determines when traffic exceeds configured thresholds on the links of the communication network. Thus, the method determines a link which is potentially about to be congested in the communication network. The method categorizes the traffic on this link by an end system attached to one end of the potentially congested link into a plurality of priority categories using application layer parameters. Using a re-direct capability of the end system, the method re-directs at least one of the pluralities of priority categories of traffic to an alternate Internet Protocol address. The method uses preconfigured Quality of Service mechanisms on the provider edge router attached to the other end of the potentially congested link to guarantee a predetermined amount of bandwidth capacity of the link to traffic destined to the alternate Internet Protocol address.
Devices, Systems, And Methods For Detecting Proximity-Based Mobile Malware Propagation
Wei Wang - Hoboken NJ, US Gang Xu - Piscataway NJ, US Gustavo de los Reyes - Fair Haven NJ, US
Assignee:
AT&T INTELLECTUAL PROPERTY I, L.P. - Reno NV
International Classification:
G06F 21/00
US Classification:
726 24
Abstract:
Devices, systems, and methods are disclosed which leverage an agent that resides in a mobile communication device to detect Proximity based Mobile Malware Propagation (PMMP). The agent injects one or several trigger network connections in the candidate connection list. These connections appear as legitimate networks and devices. However, the triggers connect to an agent server on a service provider's network. Essentially, the method is based on the assumption that malware lacks the intelligence to differentiate the trigger network connection from a normal one. Therefore, by attempting to connect through the trigger network connection, the malware reveals itself. The system helps collect the malware signature within a short period of time after the malware outbreak in local areas, and such attacks typically bypass network based security inspection in the network.
Wei Wang - Hoboken NJ, US Gang Xu - Piscataway NJ, US
Assignee:
AT&T INTELLECTUAL PROPERTY I, L.P. - Reno NV
International Classification:
G06F 21/00
US Classification:
726 24
Abstract:
Devices, systems, and methods are disclosed which utilize lightweight agents on a mobile device to detect message-based attacks. In exemplary configurations, the lightweight agents are included as contacts on the mobile device addressed to an agent server on a network. A malware onboard the mobile device, intending to propagate, unknowingly addresses the lightweight agents, sending messages to the agent server. The agent server analyzes the messages received from the mobile device of the deployed lightweight agents. The agent server then generates attack signatures for the malware. Using malware propagation models, the system estimates how many active mobile devices are infected as well as the total number of infected mobile devices in the network. By understanding the malware propagation, the service provider can decide how to deploy a mitigation plan on crucial locations. In further configurations, the mechanism may be used to detect message and email attacks on other devices.
Methods And Apparatus To Configure Virtual Private Mobile Networks To Reduce Latency
Jacobus Van der Merwe - New Providence NJ, US Xu Chen - Ann Arbor MI, US Baris Coskun - Brooklyn NY, US Gustavo de los Reyes - Fair Haven NJ, US Seungjoon Lee - Basking Ridge NJ, US Suhas Mathur - Edison NJ, US Arati Baliga - Edison NJ, US Gang Xu - Piscataway NJ, US
International Classification:
G06F 15/177
US Classification:
709220
Abstract:
Methods and apparatus to configure virtual private mobile networks for latency are disclosed. A disclosed example method includes provisioning logically a virtual private mobile network within a wireless network to reduce latency of a communication associated with a latency sensitive application, determining a mobile device is communicatively coupling to the wireless network via the latency sensitive application, and coupling the mobile device to the virtual private mobile network to reduce latency of the communication associated with the latency sensitive application.
Name / Title
Company / Classification
Phones & Addresses
Gang Xu Advisory Director
Schlumberger Foundation, Inc. Membership Organizations
153 E 53Rd St Fl 57, New York, NY 10022
Gang Xu
WESTLAKE ES LLC
Isbn (Books And Publications)
Epipolar Geometry in Stereo, Motion and Object Recognition: A Unified Approach
Goldman Sachs Dec 2007 - Jul 2010
Commoditiy Strategist
Constellation Energy Aug 2001 - Dec 2007
Commodity Strategist
Aug 2001 - Dec 2007
Head of Quant Research
Education:
The University of Texas at Austin 1995 - 2001
Doctorates, Doctor of Philosophy, Physics
Peking University 1989 - 1994
Bachelors, Bachelor of Science, Physics
Skills:
Quantitative Finance Derivatives Commodity Commodity Markets Quantitative Analytics Fixed Income Energy Energy Markets Monte Carlo Simulation Market Risk Portfolio Optimization Credit Risk Risk Modeling Commodity Risk Management Statistics Stochastic Calculus Oil/Gas Var Structured Commodity Finance Commodity Pricing Stochastic Differential Equations Project Management Python C++ Factor Analysis Time Series Analysis Exotic Derivatives Quantitative Investing Quantitative Matlab Dynamic Programming Options Strategies Futures Numerical Linear Algebra Numerical Simulation Regression Analysis Optimization Data Science Operational Risk Management It Risk Management Financial Risk Management Numerical Analysis Cloud Computing
Kwa Analytics
Senior Consultant
Openlink Financial Aug 2000 - May 2018
Senior Software Engineering and Technical Consultant
Education:
University of Maine 1994 - 1996
Masters
Jiangxi University
Bachelors, Bachelor of Science
Skills:
Java Openlink Opencomponents Fixed Income Sql Openlink Jvs .Net C C++ Openlink Openlink Avs C# Energy Trading Team Foundation Server Subversion Endur Findur Crystal Reports It Management Oracle Database Microsoft Sql Server