Sep 2002 to 2000 Associate ManagerCenter for Immunization Research (CIR), Johns Hopkins Baltimore, MD Sep 2013 to Aug 2014 Laboratory TechnicianB. Braun Medical Inc. Irvine, CA Sep 2011 to Jul 2012 Microbiology Quality Control Analyst IIIrvine Eye Physicians & Surgeons
Sep 2010 to Mar 2011 Ophthalmic TechnicianWestminster House Berkeley, CA Jun 2007 to Sep 2007 Summer Resident Assistant
Education:
Johns Hopkins School of Public Health 2012 to 2013 MHS in Microbiology & ImmunologyUniversity of California, Berkeley Berkeley, CA Aug 2006 to Aug 2010 BA in Integrative Biology
Skills:
Research<br/>Management Experience<br/>Communication<b... Management<br/>Testing<br/>Fir... Aid Certified<br/>Microsoft Office<br/>Creative Problem Solving<br/>Six Sigma<br/>Calibration<br/>Writ... Development<br/>Customer Service<br/>Computer Skills<br/>Database Management<br/>Marketing<br/>N... Management
Miramar Eye Specialists Medical Group 751 E Daily Dr STE 110, Camarillo, CA 93010 8059878705 (phone), 8059877765 (fax)
Miramar Eye Specialists Medical Group 3085 Loma Vis Rd, Ventura, CA 93003 8056483085 (phone), 8056487027 (fax)
Miramar Eye Specialists Medical Group 1901 Solar Dr STE 155, Oxnard, CA 93036 8052780057 (phone), 8052789925 (fax)
Education:
Medical School Baylor College of Medicine Graduated: 2009
Procedures:
Destruction of Lesion of Retina and Choroid Ophthalmological Exam
Conditions:
Cataract Glaucoma
Languages:
English Spanish
Description:
Dr. Chen graduated from the Baylor College of Medicine in 2009. He works in Ventura, CA and 2 other locations and specializes in Ophthalmology. Dr. Chen is affiliated with Community Memorial Hospital and Ventura County Medical Center.
Kaiser Permanente Medical GroupKaiser Permanente Vallejo Medical Center Gastroenterology 975 Sereno Dr, Vallejo, CA 94589 7076513264 (phone), 7076512783 (fax)
Coast Guard Air Station Clinic 5342 Dudley Blvd, McClellan, CA 95652 9165617568 (phone), 9165617566 (fax)
Education:
Medical School Inst of Med I, Yangon, Myanmar Graduated: 1982
Dr. Chen graduated from the Inst of Med I, Yangon, Myanmar in 1982. She works in Vallejo, CA and 1 other location and specializes in Gastroenterology. Dr. Chen is affiliated with Kaiser Permanente Vallejo Medical Center.
University Of Iowa Orthopaedics & Rehabilitation 200 Hawkins Dr STE 01067 PAPA JOHN PAVILION, Iowa City, IA 52242 3193562466 (phone), 3193538968 (fax)
Education:
Medical School Brown University Alpert Medical School Graduated: 1996
Procedures:
Neurological Testing Physical Medicine and Rehabilitation, Tests and Measurements Physical Therapy Physical Therapy Evaluation
Languages:
English Spanish
Description:
Dr. Chen graduated from the Brown University Alpert Medical School in 1996. He works in Iowa City, IA and specializes in Physical Medicine & Rehabilitation. Dr. Chen is affiliated with University Of Iowa Hospitals & Clinics.
Smith Chen Inc 11455 Fallbrook Dr STE 302, Houston, TX 77065 2818901158 (phone), 2818900710 (fax)
Conditions:
Tempromandibular Joint Disorders (TMJ)
Languages:
Chinese English French Spanish
Description:
Dr. Chen works in Houston, TX and specializes in Oral & Maxillofacial Surgery. Dr. Chen is affiliated with Baylor St Lukes Medical Center and Houston Methodist Hospital.
Rodney M. Goodman - Altadena CA, US Donal J. Woods - Los Angeles CA, US Patricia A. Keaton - Woodland Hills CA, US Joseph Chen - Pasadena CA, US
Assignee:
California Institute of Technology - Pasadena CA
International Classification:
G06K009/72
US Classification:
382186, 382229
Abstract:
A method of automatically recognizing text. The text is divided into whole words which are each recognize. Each whole word is characterized according to its silhouette. The silhouette is characterized by features in the silhouette such as upwardly extending “polls” and downwardly extending “holes”. The silhouette may also be characterized by its first syllable blends. Numbers are assigned to each of the different characteristics, and numbers may also be assigned based on analysis of a database of different kinds of cursive words. Recognition may be automatically carry out prior recognizing system which recognizes in this way.
Behavioral Detection Based On Uninstaller Modification Or Removal
Joseph Chen - Los Angeles CA, US Jamie Jooyoung Park - Los Angeles CA, US
Assignee:
Symantec Corporation - Mountain View CA
International Classification:
G06F 11/00
US Classification:
726 23
Abstract:
To evade heuristic detection, malware is often designed to trick users into installing the malware by being packaged in a standard installer known to the user's computer for typically installing legitimate software. To prevent removal of the malware, the malware modifies or removes its uninstaller. A security module manages this type of evasion technique by monitoring and detecting installations performed on a computer. The module detects attempts to remove or modify the uninstaller for the application to render the uninstaller incapable of uninstalling the application. The module can intercept and block such attempts, and then analyze the application for malicious code. Where the application is determined to be malware, the module prevents malicious activity. The module can also use the malware's own uninstaller to uninstall the malware from the computer.
Michael N. Agostino - Glendale CA, US Jason P. Fields - Los Angeles CA, US Joseph Chen - Los Angeles CA, US Yovav Meydad - Los Angeles CA, US Jason Levine - Los Angeles CA, US Michael Radford - Sierra Madre CA, US David E. Benson - Pasadena CA, US Christopher Starace - Pasadena CA, US Eric J. Kim - Sherman Oaks CA, US
Assignee:
Snap Technologies, Inc. - Pasadena CA
International Classification:
G06Q 30/00
US Classification:
705 144, 705 11
Abstract:
The invention in some embodiments features a contextual content delivery system (CCDS) for enhancing conventional web content with pop-up bubbles that display information when a cursor hovers over a word, link, or icon. The CCDS is configured to identify words or links in a document, determine their context, select the appropriate bubble from a plural of bubble types for each of the words or links, select content for each bubble based, in part, on the context in which the words and hyperlinks are used. The context can be determined from various sources including the resource in which the word or link appears and the target resource to which the link points. Thereafter, the CCDS enhances the words or links so that bubbles are automatically invoked in response to the appropriate trigger.
Kamron Farrokh - Beverly Hills CA, US Jamie Jooyoung Park - Los Angeles CA, US Joseph Chen - Los Angeles CA, US
Assignee:
Symantec Corporation - Mountain View CA
International Classification:
H04L 29/06
US Classification:
726 23, 713188
Abstract:
A computer-implemented method for tracing attacks. The method may include identifying a first website and determining that the first website loads an attack remotely through a second website. The method may also include determining that the second website hosts the attack. The method may include performing a security action, such as blocking downloads from the second website, with respect to the second website. The attack may be a drive-by download. Corresponding systems and computer-readable media are also disclosed.
Heuristic Detection Malicious Code Blacklist Updating And Protection System And Method
Christopher Peterson - Culver City CA, US Joseph H. Chen - Los Angeles CA, US
Assignee:
Symantec Corporation - Mountain View CA
International Classification:
H04L 29/06
US Classification:
726 24, 726 23, 726 25, 713187, 713188
Abstract:
Unknown malicious code is heuristically detected on a host computer system. A virus signature for the malicious code is created locally on the host computer system. A blacklist on the host computer system is updated with the virus signature for the heuristically detected malicious code. Accordingly, the blacklist is updated with the virus signature of the heuristically detected malicious code without distribution of the virus signature to the general public. Further, the host computer system is scanned for other instances of the heuristically detected malicious code using the created virus signature. Accordingly, file based detection and remediation of the malicious code is achieved without requiring execution of the malicious code for detection and the associated risks.
Systems And Methods For Using Property Tables To Perform Non-Iterative Malware Scans
Joseph Chen - Los Angeles CA, US Allen Hair - Los Angeles CA, US
Assignee:
Symantec Corporation - Mountain View CA
International Classification:
G06F 21/00
US Classification:
726 24
Abstract:
A computer-implemented method for using property tables to perform non-iterative malware scans may include (1) obtaining at least one malware signature from a security software provider that identifies at least one property value for an item of malware, (2) accessing a property table for a computing device that identifies property values shared by one or more application packages installed on the computing device and, for each property value, each application package that shares the property value in question, and (3) determining, by comparing each property value identified in the malware signature with the property table, whether any of the application packages match the malware signature without having to iterate through the individual property values of each application package. Various other methods, systems, and computer-readable media are also disclosed.
Robert Conrad - Culver City CA, US Christopher Peterson - Culver City CA, US Joseph H. Chen - Los Angeles CA, US
Assignee:
Symantec Corporation - Mountain View CA
International Classification:
G06F 21/00
US Classification:
726 23, 726 22
Abstract:
A submission filtering component filters malware related content received for analysis. The submission filtering component determines an analysis priority rating for each source from which malware related content is received. An analysis priority ratings is based on various factors indicative of how likely the source is to transmit malware related content that is important to analyze. The malware filtering component transforms the received stream of malware related content into a subset to be analyzed, based on the analysis priority ratings associated with sources from which malware related content is received. A malware analysis component analyzes the subset of malware related content.
Using File Prevalence To Inform Aggressiveness Of Behavioral Heuristics
The prevalence rate of a file to be subject to behavior based heuristics analysis is determined, and the aggressiveness level to use in the analysis is adjusted, responsive to the prevalence rate. The aggressiveness is set to higher levels for lower prevalence files and to lower levels for higher prevalence files. Behavior based heuristics analysis is applied to the file, using the set aggressiveness level. In addition to setting the aggressiveness level, the heuristic analysis can also comprise dynamically weighing lower prevalence files as being more likely to be malicious and higher prevalence files as being less likely. Based on the applied behavior based heuristics analysis, it is determined whether or not the file comprises malware. If it is determined that the file comprises malware, appropriate steps can be taken, such as blocking, deleting, quarantining and/or disinfecting the file.
Name / Title
Company / Classification
Phones & Addresses
Joseph Chen President
Bela Construction Ltd Contractors-General
1668 W 75 Ave, Vancouver, BC V6P 6G2 6042648202, 6042647022
Joseph Chen President
Great TAO Foundation of Amer Religious Organizations
11645 Lower Azusa Rd, El Monte, CA 91732
Joseph Chen Owner
Greenlite Cable Accesories Motors and Generators
2430 Lee Ave, El Monte, CA 91733
Joseph Chen Executive Officer
Cc & Associates, Inc. Dba New Computer Programming Services
10375 Slusher Dr, Whittier, CA 90670
Joseph Chen Doctor Of Medicine
Alcohol Drug Abuse Services County of Orange Individual and Family Social Services
14180 Beach Blvd # 2Ndf, Westminster, CA 92683
Joseph Chen Assistant Professor Department Of Finance And Business Economics
University of Southern California Inc Colleges, Universities, and Professional Scho...
3560 Watts Way Rm 107, Los Angeles, CA 90089
Joseph Chen Religious Leader
Great Tao Foundation-America Religious Organizations
11645 Lower Azusa Rd, El Monte, CA 91732 Website: greattao.org
Joseph Chen Manager
Markwins International Corp Perfumes, Cosmetics, and Other Toilet Prepara...
Health Care Agency - Physician (1993) UCSF - Physician (1986-1989) UCLA - Physician (1983-1986) National Cheng Kung University - Faculty physician (1989-1993)
Education:
Harvard - MPH, National Taiwan University - Medicine, Chien-Guo High School, Taipei, Taiwan, Taiwan University, Harvard University, UCLA, UCSF
Joseph Chen
Lived:
West Covina. CA Valley Village, CA
Education:
Mt. San Antonio College - Film
Tagline:
I know you want to ask me something. Just ask... Why yes, I am awesome.
Joseph Chen
Education:
University of California, Los Angeles - Communication Studies, University of California, San Diego - Communication
Bragging Rights:
Ate an entire large pizza by myself
Joseph Chen
Education:
Chinese University of Hong Kong - EMBA
Joseph Chen
Work:
IGS
Education:
National Chiao Tung University - Mechanical Engineering
Joseph Chen
Education:
National Tsing Hua University, National Central University - Computer Science
Tagline:
A castle in the air
Joseph Chen
Joseph Chen
Work:
Electroline Equipment Inc. - Director of Business Development (2010)
A U.S. Navy helicopter that was flying by spotted the driver, Joseph Chen, 45, of Greenville, N.C., on top of the vehicle's cab and hoisted him aboard about 5 minutes later, according toMike Maus, spokesman for Naval Air Force Atlantic. Chen died as the helicopter was flying him to a hospital.
Date: Feb 10, 2017
Category: U.S.
Source: Google
CBBT Police say wind was not a factor in deadly tractor trailer accident
Chief Edward Spencer says the truck went over the side of the CBBT after trying to pass another tractor trailer. Chief Spencer says Joseph Chen was in the right lane and attempting to pass a tractor trailer in front of him by driving into the left lane. Once in the left lane, Chen's truck rode up on
Date: Feb 10, 2017
Category: U.S.
Source: Google
Wife: Driver who went over bridge was ' an awesome husband'
Forty-seven-year-old Joseph Chen of Greenville, North Carolina, died Thursday, shortly after he was plucked from the frigid water by a U.S. Navy helicopter crew. After the truck fell into the bay amid strong winds, Chen was briefly seen standing on top of the trailer.
Date: Feb 10, 2017
Category: U.S.
Source: Google
Man Drives Truck off Bridge; Dies After Helicopter Rescue
The truck driver died on the way to a hospital in Norfolk, said Thomas Anderson, deputy director of the Virginia-based Chesapeake Bay Bridge and Tunnel District. Anderson identified the driver as Joseph Chen, 47, of Greenville, North Carolina.
Date: Feb 09, 2017
Category: U.S.
Source: Google
Kenya is the latest battleground for China's supremacy over Taiwan
According to Joseph Chen, from Taiwans office in South Africa, the Chinese diplomat told him he had no authority to speak to the accused because Kenya does not recognize Taiwan and there is no Taiwanese consulate in Kenya.
Date: Apr 12, 2016
Category: World
Source: Google
Fundrise Raises $31+ Million, Led by Renren Inc., Silverstein Properties, and the ...
Joseph Chen, Chairman and CEO of Renren Inc., commented, We have seen crowdfunding sweep through large verticals of consumer finance, including student loans and credit card debt. We believe that the real estate market is the newe
"We have to have great virtual reality content," said senior product manager Joseph Chen. "That's why we're putting such emphasis on game developers...We think new games will evolve out of this. It's not just going to be 'go there/ kill this.'"
Date: Apr 02, 2013
Category: Sci/Tech
Source: Google
Microsoft Patch Tuesday Swats 23 Security Bugs, Including Duqu Exploit
The .NET vulnerabilities are also prominent in this months patches, said Joseph Chen, engineering director, security technology and response, at Symantec. Exploits for this vulnerability are likely to be hosted as drive-by downloads on maliciously created or otherwise compromised Websites. So, a