Search

Hongrui Gong

age ~60

from San Diego, CA

Also known as:
  • Gong Wu Hongui
Phone and address:
14445 Seabridge Ln, San Diego, CA 92128
(858)4519629

Hongrui Gong Phones & Addresses

  • 14445 Seabridge Ln, San Diego, CA 92128 • (858)4519629
  • 14246 Dalhousie Rd, San Diego, CA 92129 • (858)7802806
  • 29754 Cheshire Ct, Menifee, CA 92584
  • Perris, CA
  • 4205 Sundance St, Santa Fe, NM 87505 • (505)4717948
  • Los Alamos, NM
  • Bryan, TX
  • Riverside, CA

Work

  • Company:
    Sas institute, inc
    Nov 2002 to Mar 2013
  • Address:
    San Diego, CA
  • Position:
    Distinguished scientist

Education

  • Degree:
    Ph.D
  • School / High School:
    Texas A&M University
    1991 to 1995
  • Specialities:
    Fluid Dynamics

Skills

Machine Learning • Predictive Analytics • Sas • Statistical Modeling • Data Mining • Predictive Modeling • Neural Networks • Algorithms • Risk Management • Business Intelligence • Big Data • Analytics • Statistics • Pattern Recognition • R • Natural Language Processing • Artificial Intelligence • Unsupervised Learning

Industries

Computer Software

Resumes

Hongrui Gong Photo 1

Principal Director, Data Science

view source
Location:
San Diego, CA
Industry:
Computer Software
Work:
SAS Institute, Inc - San Diego, CA Nov 2002 - Mar 2013
Distinguished Scientist

FICO / HNC Software - San Diego, CA Jul 1998 - Nov 2002
Lead/Senior Scientist

Los Alamos National Laboratory Jul 1997 - Jun 1998
Postdoctoral Research Associate

China Huaneng Group Aug 1988 - Jan 1991
Project Manager
Education:
Texas A&M University 1991 - 1995
Ph.D, Fluid Dynamics
Chinese Academy of Sciences 1985 - 1988
MS, Aerodynamics
Tsinghua University 1980 - 1985
BS, Turbomachinary
Skills:
Machine Learning
Predictive Analytics
Sas
Statistical Modeling
Data Mining
Predictive Modeling
Neural Networks
Algorithms
Risk Management
Business Intelligence
Big Data
Analytics
Statistics
Pattern Recognition
R
Natural Language Processing
Artificial Intelligence
Unsupervised Learning

Us Patents

  • Computer-Implemented Semi-Supervised Learning Systems And Methods

    view source
  • US Patent:
    20130346350, Dec 26, 2013
  • Filed:
    Nov 30, 2012
  • Appl. No.:
    13/691437
  • Inventors:
    SAS Institute Inc. - Cary NC, US
    Vijay S. Desai - San Diego CA, US
    Hongrui Gong - San Diego CA, US
  • Assignee:
    SAS Institute Inc. - Cary NC
  • International Classification:
    G06N 3/08
  • US Classification:
    706 20
  • Abstract:
    Computer-implemented systems and methods for determining a subset of unknown targets to investigate. For example, a method can be configured to receive a target data set, wherein the target data set includes known targets and unknown targets. A supervised model such as a neural network model is generated using the known targets. The unknown targets are used with the neural network model to generate values for the unknown targets. Analysis with an unsupervised model is performed using the target data set in order to determine which of the unknown targets are outliers. A comparison of list of outlier unknown targets is performed with the values for the unknown targets that were generated by the neural network model. The subset of unknown targets to investigate is determined based upon the comparison.
  • Computer-Implemented Semi-Supervised Learning Systems And Methods

    view source
  • US Patent:
    8346691, Jan 1, 2013
  • Filed:
    Sep 6, 2007
  • Appl. No.:
    11/850861
  • Inventors:
    Revathi Subramanian - San Diego CA, US
    Vijay S. Desai - San Diego CA, US
    Hongrui Gong - San Diego CA, US
  • Assignee:
    SAS Institute Inc. - Cary NC
  • International Classification:
    G06F 15/18
  • US Classification:
    706 15, 706 12
  • Abstract:
    Computer-implemented systems and methods for determining a subset of unknown targets to investigate. For example, a method can be configured to receive a target data set, wherein the target data set includes known targets and unknown targets. A supervised model such as a neural network model is generated using the known targets. The unknown targets are used with the neural network model to generate values for the unknown targets. Analysis with an unsupervised model is performed using the target data set in order to determine which of the unknown targets are outliers. A comparison of list of outlier unknown targets is performed with the values for the unknown targets that were generated by the neural network model. The subset of unknown targets to investigate is determined based upon the comparison.
  • Predictive Analysis Platform

    view source
  • US Patent:
    20200273570, Aug 27, 2020
  • Filed:
    Feb 22, 2019
  • Appl. No.:
    16/282905
  • Inventors:
    - Dublin, IE
    Hongrui GONG - San Diego CA, US
    Lingjun A. HE - San Diego CA, US
    Stewart DE SOTO - Escondido CA, US
    Aaron Goodman LEVINE - Encinitas CA, US
  • International Classification:
    G16H 50/20
    G16H 15/00
    G16H 10/60
    G06N 5/04
    G06N 20/00
  • Abstract:
    A device may receive, from multiple systems, data related to an individual. The device may anonymize, after receiving the data and using an anonymization technique, information included in the data that identifies the individual. The device may apply a formatting to the data after anonymizing the information that identifies the individual. The device may identify, after applying the formatting to the data, historical data related to the individual, to a provider associated with a claim for care, or to historical claims, and population data associated with demographics of the individual. The device may process, in association with identifying the historical data and the population data, the data using a machine learning model. The machine learning model may be associated with generating a prediction related to the individual or the care provided to the individual. The device may perform one or more actions based on the prediction.
  • Predictive Issue Detection

    view source
  • US Patent:
    20200226503, Jul 16, 2020
  • Filed:
    Jan 11, 2019
  • Appl. No.:
    16/245953
  • Inventors:
    - Dublin, IE
    Hongrui Gong - San Diego CA, US
    Ibrahim Ali Odeh Al-Shyoukh - Loma Linda CA, US
  • International Classification:
    G06Q 10/04
    G06N 20/20
    G06K 9/62
    G06Q 40/00
    G06Q 30/04
    G06F 16/387
  • Abstract:
    A device may receive data that includes invoice data related to historical invoices from an organization, contact data related to historical contacts between the organization and various entities, and dispute data related to historical disputes between the organization and the various entities. The device may determine a profile for the data. The device may determine a set of supervised learning models for the historical invoices based on one or more of the historical contacts, the historical disputes, the historical invoices, or historical patterns related to the historical invoices. The device may determine, using the profile, a set of unsupervised learning models for the historical invoices independent of the one or more of the historical contacts, the historical disputes, or the historical patterns. The device may determine, utilizing a super model, a prediction for the invoice after the super model is trained. The device may perform one or more actions.
  • Authenticating Identity For Password Changes

    view source
  • US Patent:
    20190036904, Jan 31, 2019
  • Filed:
    Sep 20, 2018
  • Appl. No.:
    16/136778
  • Inventors:
    - New York NY, US
    Debra Danielson - Sillman NJ, US
    Kenneth W. S. Morrison - Vancouver, CA
    Hongrui Gong - San Diego CA, US
  • International Classification:
    H04L 29/06
    G06F 21/31
  • Abstract:
    In an embodiment, a password risk evaluator may receive a request including a user identifier (ID) and a password. The password risk evaluator may retrieve a password preference model associated with the user ID, and may determine a risk score indicating a likelihood that the password is associated with the user ID. For example, the password preference model may be based on previous passwords used by the user, and may identify one or more characteristics, formulas, rules, or other indicia typically employed by the user in creating passwords. If the password supplied in the request matches or is similar to one or more elements of the password preference model, it may be more likely that the password in the request is a password supplied by the user. That is, the risk score may be an authentication of the user, or part of the authentication of the user, in some embodiments.
  • Authenticating Identity For Password Changes

    view source
  • US Patent:
    20180124033, May 3, 2018
  • Filed:
    Oct 27, 2016
  • Appl. No.:
    15/335711
  • Inventors:
    - New York NY, US
    Debra Danielson - Sillman NJ, US
    Kenneth W. S. Morrison - Vancouver, CA
    Hongrui Gong - San Diego CA, US
  • International Classification:
    H04L 29/06
  • Abstract:
    In an embodiment, a password risk evaluator may receive a request including a user identifier (ID) and a password. The password risk evaluator may retrieve a password preference model associated with the user ID, and may determine a risk score indicating a likelihood that the password is associated with the user ID. For example, the password preference model may be based on previous passwords used by the user, and may identify one or more characteristics, formulas, rules, or other indicia typically employed by the user in creating passwords. If the password supplied in the request matches or is similar to one or more elements of the password preference model, it may be more likely that the password in the request is a password supplied by the user. That is, the risk score may be an authentication of the user, or part of the authentication of the user, in some embodiments.
  • Selective Authentication Based On Similarities Of Ecommerce Transactions From A Same User Terminal Across Financial Accounts

    view source
  • US Patent:
    20160203485, Jul 14, 2016
  • Filed:
    Jan 8, 2015
  • Appl. No.:
    14/592136
  • Inventors:
    - New York NY, US
    Paul C. Dulany - San Diego CA, US
    Hongrui Gong - San Diego CA, US
    Kannan Shashank Shah - San Diego CA, US
  • Assignee:
    CA, INC. - New York NY
  • International Classification:
    G06Q 20/40
  • Abstract:
    A method of operating a computer system includes receiving from a merchant node an eCommerce authentication request for a pending eCommerce transaction associated with a user terminal. The eCommerce authentication request contains transaction information of the pending eCommerce transaction that includes a user terminal identifier. A risk score for the pending eCommerce transaction is generated based on similarities between the transaction information of the pending eCommerce transaction and a cluster of historical eCommerce transactions each containing transaction information including a user terminal identifier that matches the user terminal identifier of the pending eCommerce transaction. The eCommerce authentication request is selectively provided to an authentication node based on the risk score.
  • Controlling Ecommerce Authentication With Non-Linear Analytical Models

    view source
  • US Patent:
    20150269578, Sep 24, 2015
  • Filed:
    Mar 21, 2014
  • Appl. No.:
    14/221612
  • Inventors:
    - Islandia NY, US
    Paul C. Dulany - San Diego CA, US
    Hongrui Gong - San Diego CA, US
    Kannan Shashank Shah - San Diego CA, US
  • Assignee:
    CA, INC. - Islandia NY
  • International Classification:
    G06Q 20/40
    G06Q 20/10
  • Abstract:
    A method of operating a computer system is disclosed. An eCommerce authentication request is received. Content of the eCommerce authentication request is processed through a non-linear analytical model to generate a risk score. The eCommerce authentication request is selectively provided to an authentication node based on the risk score. Related authentication gateway nodes and computer program products are disclosed.

Youtube

Sun Hongrui VS Jia Haochen - Joy Cup 2019 Wor...

  • Duration:
    1h 59m 47s

Sun Hongrui VS Hwang Yong (KOR) - World Chin...

  • Duration:
    1h 36m 52s

Gong Gong Gong - "Ride Your Horse " (Official...

gonggonggong.ban... Ride Your Horse written, recorded and performed ...

  • Duration:
    3m 34s

World TaiChi and Qigong Day 2017: Sound Healing

Wisdom Healing Qigong with Master Mingtong Gu and the Chi Center. Worl...

  • Duration:
    1h 4m 55s

Haola Lachi Practice on Zhineng Qigong Cultur...

Master Mingtong leads a powerful Lachi practice. Wisdom Healing Qigong...

  • Duration:
    52m 12s

What is Gongbi Style Chinese Painting? an ins...

Thanks for watching! Henry Li.

  • Duration:
    25m 35s

Zhou Doudou VS Gong Bailing - Chinese Ladies ...

  • Duration:
    1h 13m 36s

tabata lion dance by hongrui

tabata ...

  • Duration:
    4m 7s

Get Report for Hongrui Gong from San Diego, CA, age ~60
Control profile