6521 Sunny Hill Ct, Mc Lean, VA 22101 • 7037486108
Jacksonville, FL
2246 Steinway St #1, Astoria, NY 11105 • 7189325562
Temple City, CA
Norwalk, CA
New York, NY
Boston, MA
Fairfax, VA
Work
Company:
J.p. morgan chase bank
Jul 2010
Position:
Vice-president
Education
School / High School:
University of Texas at Austin- Austin, TX
2001
Specialities:
PhD in Physics
Skills
commodities • c++ • derivatives pricing • risk management • credit risk • stochastic • Monte Carlo • time series analysis • python • trading system • exotics • energy • power
Gladinet Inc since Sep 2008
Testing
Alcatel-Lucent Apr 1999 - Aug 2008
MTS
Lucent Technologies 1999 - 2008
MTS
Education:
University of Alabama 1997 - 1999
MS, Computer Science
China University of Mining and Technology 1993 - 1996
MS, Power Electronics
Xiamen University 1989 - 1993
BS, Computer Science
Jul 2010 to 2000 Vice-PresidentGOLDMAN SACHS CO. JAPAN Tokyo, JP Jun 2008 to Jul 2010 Vice-PresidentGOLDMAN SACHS CO New York, NY Dec 2007 to Jun 2008 Vice-PresidentCONSTELLATION ENERGY COMMODITY GROUP
Aug 2001 to Dec 2007 Vice-President
Education:
University of Texas at Austin Austin, TX 2001 PhD in PhysicsBeijing University 1994 BS in Physics
Skills:
commodities,c++,derivatives pricing,risk management,credit risk,stochastic,Monte Carlo,time series analysis,python,trading system,exotics,energy,power
Gustavo de los Reyes - Fair Haven NJ, US Gang Xu - Piscataway NJ, US
Assignee:
AT&T Intellectual Property I, L.P. - Atlanta GA
International Classification:
G01C 21/34 G08G 1/01
US Classification:
701118, 701410, 4554565
Abstract:
A cellular-based live traffic service that does not require pre-deployment of infrastructure or GPS-enabled devices uses signals provided by cellular devices to determine course resolution localization and tracking information of the cellular devices. Specialized statistical analysis is performed on the course resolution data to infer the fine resolution positions of the cellular devices. In an example embodiment, the localization and tracking information is provided on a map, or the like, to show relative position and/or trajectory of cellular devices.
Methods, Devices, Systems, And Computer Program Products For Edge Driven Communications Network Security Monitoring
Gustavo de los Reyes - Fair Haven NJ, US Thusitha Jayawardena - Holmdel NJ, US Gang Xu - Piscataway NJ, US
Assignee:
AT&T Intellectual Property I, L.P. - Reno NV
International Classification:
G06F 21/00
US Classification:
726 22, 713188, 726 24
Abstract:
An edge monitoring approach can be utilized to detect an attack which includes a plurality of relatively low bandwidth attacks, which are aggregated at a victim sub-network. The aggregated low bandwidth attacks can generate a relatively high bandwidth attack including un-solicited data traffic directed to the victim' so that the aggregated attack becomes more detectable at an edge monitor circuit located proximate to the victim. Related systems, devices, and computer program products are also disclosed.
Method And System For Controlling Physical Components Via A Virtual Environment
Gustavo De Los Reyes - Fair Haven NJ, US Sanjay MacWan - Marlboro NJ, US Gang Xu - Piscataway NJ, US Howard Shirokmann - Point Pleasant NJ, US Rachel Rosencrantz - Boulder CO, US Thusitha Jayawardena - Holmdel NJ, US
Assignee:
AT & T Intellectual Property, LP. - Atlanta GA
International Classification:
G06F 3/048
US Classification:
715771
Abstract:
A computer readable storage medium storing a set of instructions that are executable by a processor, the set of instructions being operable to store a virtual representation of a plurality of physical components, display the virtual representation, receive user interaction with at least one of the virtual representations and send a command to the physical component corresponding to the user interaction.
Methods And Apparatus To Enhance Security In Residential Networks
Thusitha Jayawardena - Holmdel NJ, US Gustavo De Los Reyes - Fair Haven NJ, US Gang Xu - Piscataway NJ, US
International Classification:
G06F 17/00 G06F 15/16
US Classification:
726 12
Abstract:
Example methods and apparatus to enhance security in residential networks and residential gateways are disclosed. A disclosed example apparatus includes a transceiver to receive an Internet protocol (IP) packet, a first packet processing module associated with a protected IP address, the first packet processing module to be communicatively coupled to a first network device, a second packet processing module associated with a public IP address, the second packet processing module to be communicatively coupled to a second network device, and a packet diverter to route the received IP packet to the first packet processing module when the IP packet contains the protected IP address and to route the IP packet to the second packet processing module when the IP packet does not contain the protected IP address.
Method And System For Dynamic Traffic Prioritization
Thusitha JAYAWARDENA - Holmdel NJ, US Gustavo de los REYES - Fair Haven NJ, US Xiao PAN - Middletown NJ, US Gang XU - Piscataway NJ, US
Assignee:
AT&T INTELLECTUAL PROPERTY I, L.P. - Reno NV
International Classification:
H04L 12/26
US Classification:
370238
Abstract:
A method provides for the dynamic traffic prioritization in a communication network. The method electronically monitors traffic in a communication network and determines when traffic exceeds configured thresholds on the links of the communication network. Thus, the method determines a link which is potentially about to be congested in the communication network. The method categorizes the traffic on this link by an end system attached to one end of the potentially congested link into a plurality of priority categories using application layer parameters. Using a re-direct capability of the end system, the method re-directs at least one of the pluralities of priority categories of traffic to an alternate Internet Protocol address. The method uses preconfigured Quality of Service mechanisms on the provider edge router attached to the other end of the potentially congested link to guarantee a predetermined amount of bandwidth capacity of the link to traffic destined to the alternate Internet Protocol address.
Devices, Systems, And Methods For Detecting Proximity-Based Mobile Malware Propagation
Wei Wang - Hoboken NJ, US Gang Xu - Piscataway NJ, US Gustavo de los Reyes - Fair Haven NJ, US
Assignee:
AT&T INTELLECTUAL PROPERTY I, L.P. - Reno NV
International Classification:
G06F 21/00
US Classification:
726 24
Abstract:
Devices, systems, and methods are disclosed which leverage an agent that resides in a mobile communication device to detect Proximity based Mobile Malware Propagation (PMMP). The agent injects one or several trigger network connections in the candidate connection list. These connections appear as legitimate networks and devices. However, the triggers connect to an agent server on a service provider's network. Essentially, the method is based on the assumption that malware lacks the intelligence to differentiate the trigger network connection from a normal one. Therefore, by attempting to connect through the trigger network connection, the malware reveals itself. The system helps collect the malware signature within a short period of time after the malware outbreak in local areas, and such attacks typically bypass network based security inspection in the network.
Wei Wang - Hoboken NJ, US Gang Xu - Piscataway NJ, US
Assignee:
AT&T INTELLECTUAL PROPERTY I, L.P. - Reno NV
International Classification:
G06F 21/00
US Classification:
726 24
Abstract:
Devices, systems, and methods are disclosed which utilize lightweight agents on a mobile device to detect message-based attacks. In exemplary configurations, the lightweight agents are included as contacts on the mobile device addressed to an agent server on a network. A malware onboard the mobile device, intending to propagate, unknowingly addresses the lightweight agents, sending messages to the agent server. The agent server analyzes the messages received from the mobile device of the deployed lightweight agents. The agent server then generates attack signatures for the malware. Using malware propagation models, the system estimates how many active mobile devices are infected as well as the total number of infected mobile devices in the network. By understanding the malware propagation, the service provider can decide how to deploy a mitigation plan on crucial locations. In further configurations, the mechanism may be used to detect message and email attacks on other devices.
Methods And Apparatus To Configure Virtual Private Mobile Networks For Security
Arati Baliga - Edison NJ, US Xu Chen - Ann Arbor MI, US Baris Coskun - Weehawken NJ, US Gustavo de los Reyes - Fair Haven NJ, US Seungjoon Lee - Basking Ridge NJ, US Suhas Mathur - Edison NJ, US Jacobus Van der Merwe - New Providence NJ, US Gang Xu - Piscataway NJ, US
International Classification:
G06F 17/00
US Classification:
726 15
Abstract:
Methods and apparatus to configure virtual private mobile networks for security are disclosed. A disclosed example method includes identifying, in a wireless network, a communication from a user equipment that matches a security event profile, transmitting, from the wireless network, an instruction to enable the user equipment to be communicatively coupled to a virtual private mobile network, the virtual private mobile network being provisioned for security within the wireless network, and enabling the user equipment to transmit a second communication through the virtual private mobile network securely isolated from other portions of the wireless network.