SAS Institute, Inc - San Diego, CA Nov 2002 - Mar 2013
Distinguished Scientist
FICO / HNC Software - San Diego, CA Jul 1998 - Nov 2002
Lead/Senior Scientist
Los Alamos National Laboratory Jul 1997 - Jun 1998
Postdoctoral Research Associate
China Huaneng Group Aug 1988 - Jan 1991
Project Manager
Education:
Texas A&M University 1991 - 1995
Ph.D, Fluid Dynamics
Chinese Academy of Sciences 1985 - 1988
MS, Aerodynamics
Tsinghua University 1980 - 1985
BS, Turbomachinary
Skills:
Machine Learning Predictive Analytics Sas Statistical Modeling Data Mining Predictive Modeling Neural Networks Algorithms Risk Management Business Intelligence Big Data Analytics Statistics Pattern Recognition R Natural Language Processing Artificial Intelligence Unsupervised Learning
Us Patents
Computer-Implemented Semi-Supervised Learning Systems And Methods
SAS Institute Inc. - Cary NC, US Vijay S. Desai - San Diego CA, US Hongrui Gong - San Diego CA, US
Assignee:
SAS Institute Inc. - Cary NC
International Classification:
G06N 3/08
US Classification:
706 20
Abstract:
Computer-implemented systems and methods for determining a subset of unknown targets to investigate. For example, a method can be configured to receive a target data set, wherein the target data set includes known targets and unknown targets. A supervised model such as a neural network model is generated using the known targets. The unknown targets are used with the neural network model to generate values for the unknown targets. Analysis with an unsupervised model is performed using the target data set in order to determine which of the unknown targets are outliers. A comparison of list of outlier unknown targets is performed with the values for the unknown targets that were generated by the neural network model. The subset of unknown targets to investigate is determined based upon the comparison.
Computer-Implemented Semi-Supervised Learning Systems And Methods
Revathi Subramanian - San Diego CA, US Vijay S. Desai - San Diego CA, US Hongrui Gong - San Diego CA, US
Assignee:
SAS Institute Inc. - Cary NC
International Classification:
G06F 15/18
US Classification:
706 15, 706 12
Abstract:
Computer-implemented systems and methods for determining a subset of unknown targets to investigate. For example, a method can be configured to receive a target data set, wherein the target data set includes known targets and unknown targets. A supervised model such as a neural network model is generated using the known targets. The unknown targets are used with the neural network model to generate values for the unknown targets. Analysis with an unsupervised model is performed using the target data set in order to determine which of the unknown targets are outliers. A comparison of list of outlier unknown targets is performed with the values for the unknown targets that were generated by the neural network model. The subset of unknown targets to investigate is determined based upon the comparison.
- Dublin, IE Hongrui GONG - San Diego CA, US Lingjun A. HE - San Diego CA, US Stewart DE SOTO - Escondido CA, US Aaron Goodman LEVINE - Encinitas CA, US
A device may receive, from multiple systems, data related to an individual. The device may anonymize, after receiving the data and using an anonymization technique, information included in the data that identifies the individual. The device may apply a formatting to the data after anonymizing the information that identifies the individual. The device may identify, after applying the formatting to the data, historical data related to the individual, to a provider associated with a claim for care, or to historical claims, and population data associated with demographics of the individual. The device may process, in association with identifying the historical data and the population data, the data using a machine learning model. The machine learning model may be associated with generating a prediction related to the individual or the care provided to the individual. The device may perform one or more actions based on the prediction.
A device may receive data that includes invoice data related to historical invoices from an organization, contact data related to historical contacts between the organization and various entities, and dispute data related to historical disputes between the organization and the various entities. The device may determine a profile for the data. The device may determine a set of supervised learning models for the historical invoices based on one or more of the historical contacts, the historical disputes, the historical invoices, or historical patterns related to the historical invoices. The device may determine, using the profile, a set of unsupervised learning models for the historical invoices independent of the one or more of the historical contacts, the historical disputes, or the historical patterns. The device may determine, utilizing a super model, a prediction for the invoice after the super model is trained. The device may perform one or more actions.
- New York NY, US Debra Danielson - Sillman NJ, US Kenneth W. S. Morrison - Vancouver, CA Hongrui Gong - San Diego CA, US
International Classification:
H04L 29/06 G06F 21/31
Abstract:
In an embodiment, a password risk evaluator may receive a request including a user identifier (ID) and a password. The password risk evaluator may retrieve a password preference model associated with the user ID, and may determine a risk score indicating a likelihood that the password is associated with the user ID. For example, the password preference model may be based on previous passwords used by the user, and may identify one or more characteristics, formulas, rules, or other indicia typically employed by the user in creating passwords. If the password supplied in the request matches or is similar to one or more elements of the password preference model, it may be more likely that the password in the request is a password supplied by the user. That is, the risk score may be an authentication of the user, or part of the authentication of the user, in some embodiments.
- New York NY, US Debra Danielson - Sillman NJ, US Kenneth W. S. Morrison - Vancouver, CA Hongrui Gong - San Diego CA, US
International Classification:
H04L 29/06
Abstract:
In an embodiment, a password risk evaluator may receive a request including a user identifier (ID) and a password. The password risk evaluator may retrieve a password preference model associated with the user ID, and may determine a risk score indicating a likelihood that the password is associated with the user ID. For example, the password preference model may be based on previous passwords used by the user, and may identify one or more characteristics, formulas, rules, or other indicia typically employed by the user in creating passwords. If the password supplied in the request matches or is similar to one or more elements of the password preference model, it may be more likely that the password in the request is a password supplied by the user. That is, the risk score may be an authentication of the user, or part of the authentication of the user, in some embodiments.
Selective Authentication Based On Similarities Of Ecommerce Transactions From A Same User Terminal Across Financial Accounts
- New York NY, US Paul C. Dulany - San Diego CA, US Hongrui Gong - San Diego CA, US Kannan Shashank Shah - San Diego CA, US
Assignee:
CA, INC. - New York NY
International Classification:
G06Q 20/40
Abstract:
A method of operating a computer system includes receiving from a merchant node an eCommerce authentication request for a pending eCommerce transaction associated with a user terminal. The eCommerce authentication request contains transaction information of the pending eCommerce transaction that includes a user terminal identifier. A risk score for the pending eCommerce transaction is generated based on similarities between the transaction information of the pending eCommerce transaction and a cluster of historical eCommerce transactions each containing transaction information including a user terminal identifier that matches the user terminal identifier of the pending eCommerce transaction. The eCommerce authentication request is selectively provided to an authentication node based on the risk score.
Controlling Ecommerce Authentication With Non-Linear Analytical Models
- Islandia NY, US Paul C. Dulany - San Diego CA, US Hongrui Gong - San Diego CA, US Kannan Shashank Shah - San Diego CA, US
Assignee:
CA, INC. - Islandia NY
International Classification:
G06Q 20/40 G06Q 20/10
Abstract:
A method of operating a computer system is disclosed. An eCommerce authentication request is received. Content of the eCommerce authentication request is processed through a non-linear analytical model to generate a risk score. The eCommerce authentication request is selectively provided to an authentication node based on the risk score. Related authentication gateway nodes and computer program products are disclosed.
Youtube
Sun Hongrui VS Jia Haochen - Joy Cup 2019 Wor...
Duration:
1h 59m 47s
Sun Hongrui VS Hwang Yong (KOR) - World Chin...
Duration:
1h 36m 52s
Gong Gong Gong - "Ride Your Horse " (Official...
gonggonggong.ban... Ride Your Horse written, recorded and performed ...
Duration:
3m 34s
World TaiChi and Qigong Day 2017: Sound Healing
Wisdom Healing Qigong with Master Mingtong Gu and the Chi Center. Worl...
Duration:
1h 4m 55s
Haola Lachi Practice on Zhineng Qigong Cultur...
Master Mingtong leads a powerful Lachi practice. Wisdom Healing Qigong...