BackgroundCheck.run
Search For

Bei Zhang, 642255 Showers Dr UNIT 155, Mountain View, CA 94040

Bei Zhang Phones & Addresses

2255 Showers Dr APT 155, Mountain View, CA 94040   

Palo Alto, CA   

Laramie, WY   

Work

Company: Shanghai university of finance and economics 2009 Position: Assistant professor in economics

Education

School / High School: New York University 2008 Specialities: Ph.D. in Economics

Mentions for Bei Zhang

Bei Zhang resumes & CV records

Resumes

Bei Zhang Photo 38

Head Of Growth

Location:
Palo Alto, CA
Industry:
Real Estate
Work:
Capital One - Richmond, Virginia Area since Apr 2010
Sr Business Analyst
Capital One - Richmond, Virginia Area Sep 2008 - Apr 2010
Sr. Data Analyst
Qimonda - richmond Feb 2006 - Sep 2008
Process Development Engineer
Education:
University of Rochester 2005 - 2006
M.S., Materials Science
University of Science and Technology of China 2001 - 2005
BS, Materials Science
NYU Stern School of Business 2012
MBA, Finance
Skills:
Data Analysis, Analysis, Data Mining, Statistical Modeling, Sas, Statistics, Predictive Modeling, Sql, Quantitative Analytics, Leadership, Business Analysis, R, Predictive Analytics, Marketing Strategy, Valuation, Analytical Skills, Direct Marketing, Segmentation, Project Planning, Design of Experiments, Digital Marketing, Management, Project Management, Attribution, Customer Insight, Strategy, Business Intelligence, Analytics, Machine Learning, Python
Languages:
English
Mandarin
Bei Zhang Photo 39

Civil Engineer

Industry:
Government Administration
Work:
Us Embassy
Civil Engineer
Bei Zhang Photo 40

Bei Zhang

Bei Zhang Photo 41

Bei Zhang

Bei Zhang Photo 42

Bei Zhang

Bei Zhang Photo 43

Bei Zhang

Bei Zhang Photo 44

Civil Engineer At Us Embassy

Position:
Civil Engineer at US Embassy
Location:
United States
Industry:
Government Administration
Work:
US Embassy
Civil Engineer
Bei Zhang Photo 45

Bei Zhang - San Jose, CA

Work:
Shanghai University of Finance and Economics 2009 to 2000
Assistant Professor in Economics
UC Santa Cruz - Santa Cruz, CA 2011 to 2013
Visting Researcher in Economics
University of San Francisco - San Francisco, CA 2011 to 2012
Adjunct Professor in Management
Consulting, Value Optima Inc 2009 to 2010
Special Consultant
New York University - New York, NY 2003 to 2009
Research scientist and research assistant
BlackRock - New York, NY 2008 to 2008
Associate
New York University - New York, NY 2002 to 2007
Teaching assistant and instructor
Education:
New York University 2008
Ph.D. in Economics
New York University 2005
M.A. in Economics
Wuhan University 2000
B.S. in Economics

Publications & IP owners

Us Patents

Fiber And Vitamin-Fortified Drink Composition And Beverage And Method Of Making

US Patent:
5976603, Nov 2, 1999
Filed:
Aug 26, 1998
Appl. No.:
9/140380
Inventors:
Suresh B. Kota - Cupertino CA
Bei Zhang - Fairfax VA
Tommy Chau - Ashburn VA
Robert K. Yang - Flushing NY
Subraman R. Cherukuri - Vienna VA
Abhijit Banerjee - Alexandria VA
Assignee:
Fuisz Technologies Ltd. - Chantilly VA
International Classification:
A23L 200
US Classification:
426590
Abstract:
A beverage composition has a source of fiber, as well as one or more additional nutrients. The composition is in the form of a shearform matrix as a result of flash-flow processing. The beverage composition is highly storage stable.

Systems And Methods Of Autonomous Voltage Control In Electric Power Systems

US Patent:
2021014, May 13, 2021
Filed:
Nov 6, 2020
Appl. No.:
17/091587
Inventors:
- Beijing, CN
- Nanjing, CN
- Jinan, CN
Bei Zhang - San Jose CA, US
Xiao Lu - San Jose CA, US
International Classification:
H02J 3/00
G05B 13/02
H02J 3/24
Abstract:
Systems and methods for autonomous voltage control in an electric power system are disclosed which include acquiring state information at buses of the electric power system, detecting a state violation from the state information, generating a first action setting based on the state violation using a deep reinforcement learning (DRL) algorithm by a first artificial intelligent (AI) agent assigned to a first region of the electric power system where the state violation occurs, and maintaining a second action setting by a second AI agent assigned to a second region of the electric power system where no substantial state violation is detected.

Systems And Method On Deriving Real-Time Coordinated Voltage Control Strategies Using Deep Reinforcement Learning

US Patent:
2020032, Oct 15, 2020
Filed:
Apr 7, 2020
Appl. No.:
16/842500
Inventors:
Di Shi - San Jose CA, US
Jiajun Duan - San Jose CA, US
Ruisheng Diao - San Jose CA, US
Bei Zhang - San Jose CA, US
Xiao Lu - Nanjing, CN
Haifeng Li - Nanjing, CN
Chunlei Xu - Nanjing, CN
Zhiwei Wang - San Jose CA, US
International Classification:
G06N 3/08
G06N 3/04
G06K 9/62
H04L 12/40
Abstract:
Systems and methods are disclosed for controlling a power system by formulating a voltage control problem using a deep reinforcement learning (DRL) method with a control objective of training a DRL-agent to regulate the bus voltages of a power grid within a predefined zone before and after a disturbance; performing offline training with historical data to train the DRL agent; performing online retraining of the DRL agent using live PMU data; and providing autonomous control of the power system below a sub-second after training.

Detecting And Deploying Countermeasures Against An Autonomous Browser

US Patent:
2019037, Dec 5, 2019
Filed:
Jun 18, 2019
Appl. No.:
16/445167
Inventors:
- Mountain View CA, US
Carl Schroeder - Mountain View CA, US
Bei Zhang - Mountain View CA, US
Sergey Shekyan - Mountain View CA, US
Salman Saghafi - Mountain View CA, US
Jarrod Overson - Mountain View CA, US
Lewis Ellis - Mountain View CA, US
Assignee:
Shape Security, Inc. - Mountain View CA
International Classification:
H04L 29/06
G06F 21/60
Abstract:
A computer system configured to improve security of server computers interacting with client computers, the system comprising: one or more processors executing instructions that cause the one or more processors to: select, from the plurality of detection tests, one or more first detection tests to be performed by a client computer; send, to the client computer, a first set of detection instructions that define the one or more first detection tests, and which when executed causes generating a first set of results that identifies a first set of characteristics of the client computer; receive the first set of results from the client computer; select one or more first countermeasures from a plurality of countermeasures based on the first set of characteristics identified in the first set of results; send, to the client computer, a first set of countermeasure instructions that define the one or more first countermeasures.

Polymorphic Obfuscation Of Executable Code

US Patent:
2019037, Dec 5, 2019
Filed:
Aug 13, 2019
Appl. No.:
16/539426
Inventors:
- Mountain View CA, US
Jarrod Overson - Santa Clara CA, US
Ben Vinegar - San Francisco CA, US
Bei Zhang - Mountain View CA, US
Assignee:
Shape Security, Inc. - Mountain View CA
International Classification:
H04L 29/06
G06F 21/56
G06F 21/54
Abstract:
This document generally relates to systems, method, and other techniques for identifying and interfering with the operation of computer malware, as a mechanism for improving system security. Some implementations include a computer-implemented method by which a computer security server system performs actions including receiving a request for content directed to a particular content server system; forwarding the request to the particular content server system; receiving executable code from the particular content server system; inserting executable injection code into at least one file of the executable code; applying a security countermeasure to the combined executable code and executable injection code to create transformed code; and providing the transformed code to a client computing device.

Polymorphic Obfuscation Of Executable Code

US Patent:
2018024, Aug 30, 2018
Filed:
Aug 30, 2016
Appl. No.:
15/756557
Inventors:
- Mountain view CA, US
Jarrod Overson - Santa Clara CA, US
Ben Vinegar - San Francisco CA, US
Bei Zhang - Mountain View CA, US
International Classification:
H04L 29/06
G06F 21/56
Abstract:
This document generally relates to systems, method, and other techniques for identifying and interfering with the operation of computer malware, as a mechanism for improving system security. Some implementations include a computer-implemented method by which a computer security server system performs actions including receiving a request for content directed to a particular content server system; forwarding the request to the particular content server system; receiving executable code from the particular content server system; inserting executable injection code into at least one file of the executable code; applying a security countermeasure to the combined executable code and executable injection code to create transformed code; and providing the transformed code to a client computing device.

Variable Runtime Transpilation

US Patent:
2017025, Sep 7, 2017
Filed:
Mar 2, 2016
Appl. No.:
15/059080
Inventors:
- Mountain View CA, US
ARIYA HIDAYAT - Mountain View CA, US
MICHAEL FICARRA - Sunnyvale CA, US
BEI ZHANG - Mountain View CA, US
JUSTIN CALL - Santa Clara CA, US
International Classification:
H04L 29/06
H04L 29/08
Abstract:
In an approach, an apparatus comprises: one or more processors; a processor logic coupled to the one or more processors and configured to: intercept, from a client computer, a request directed to a server computer that identifies a purported user agent executing on the client computer; send, to the server computer, the request from the client computer; intercept, from the server computer, one or more original instructions to be executed by the purported user agent of the client computer; determine one or more features supported by the purported user agent that are not utilized by the one or more original instructions; transform the one or more original instructions into one or more revised instructions which, when executed by the purported user agent, cause the purported user agent to utilize the one or more features; send, to the client computer, the one or more revised instructions.

Reverse Proxy Computer: Deploying Countermeasures In Response To Detecting An Autonomous Browser Executing On A Client Computer

US Patent:
2017023, Aug 17, 2017
Filed:
Feb 10, 2017
Appl. No.:
15/430224
Inventors:
- Palo Alto CA, US
Carl Schroeder - Mountain View CA, US
Bei Zhang - Mountain View CA, US
Sergey Shekyan - Mountain View CA, US
Salman Saghafi - Mountain View CA, US
Jarrod Overson - Mountain View CA, US
Lewis Ellis - Mountain View CA, US
International Classification:
H04L 29/06
Abstract:
A computer system configured to improve security of server computers interacting with client computers, the system comprising: one or more processors executing instructions that cause the one or more processors to: select, from the plurality of detection tests, one or more first detection tests to be performed by a client computer; send, to the client computer, a first set of detection instructions that define the one or more first detection tests, and which when executed causes generating a first set of results that identifies a first set of characteristics of the client computer; receive the first set of results from the client computer; select one or more first countermeasures from a plurality of countermeasures based on the first set of characteristics identified in the first set of results; send, to the client computer, a first set of countermeasure instructions that define the one or more first countermeasures.

NOTICE: You may not use BackgroundCheck or the information it provides to make decisions about employment, credit, housing or any other purpose that would require Fair Credit Reporting Act (FCRA) compliance. BackgroundCheck is not a Consumer Reporting Agency (CRA) as defined by the FCRA and does not provide consumer reports.