Patent classifications
G06F18/21375
EARLY NETWORK GROWTH WARNING SYSTEM AND METHOD
A growth predictor includes a monitor, a prediction engine, and a prioritization engine. The monitor receives or generates first information of a network already identified as a candidate money laundering (ML) network by an anti-money-laundering system. The prediction engine predicts second information indicative of a growth size of the ML network at a future time based on the first information. The prediction engine executes one or more predictive models to generate the second information indicative of growth size based on the first information, which indicates one or more changes that have occurred in the candidate ML network over a past period of time. The prioritization engine determines a priority of the candidate ML network based on the second information.
SYSTEMS AND METHODS FOR GENERATION AND DEPLOYMENT OF A HUMAN-PERSONIFIED VIRTUAL AGENT USING PRE-TRAINED MACHINE LEARNING-BASED LANGUAGE MODELS AND A VIDEO RESPONSE CORPUS
A system and method for implementing a machine learning-based virtual dialogue agent includes computing an input embedding based on receiving a user input; computing, via a pre-trained machine learning language model, an embedding response inference based on the input embedding; searching, based on the embedding response inference, a response imprintation embedding space that includes a plurality of distinct embedding representations of potential text-based responses to the user input, wherein each of the plurality of distinct embedding representations is tethered to a distinct human-imprinted media response, and searching the response imprintation embedding space includes: searching the response imprintation embedding space based on an embedding search query, and returning a target embedding representation from the response imprintation embedding space based on the searching of the response imprintation embedding space; and executing, via a user interface of the machine learning-based virtual dialogue agent, a human-imprinted media response tethered to the target embedding representation.
INTERACTING WITH MACHINES USING NATURAL LANGUAGE INPUT AND A STATE GRAPH
In one embodiment, a method is provided. The method includes obtaining sensor data indicative of a set of objects detected within an environment. The method also includes determining a set of positions of the set of objects and a set of properties of the set of objects based on the sensor data. The method further includes generating a state graph based on the sensor data. The state graph represents the set of objects and the set of positions of the set of objects. The state graph includes a set of object nodes to represent the set of objects and a set of property nodes to represent the set of properties of the set of objects. The state graph is provided to a graph enhancement module that updates the state graph with additional data to generate an enhanced state graph.
INTERACTING WITH MACHINES USING NATURAL LANGUAGE INPUT AND AN ENHANCED STATE GRAPH
A method is provided. The method includes obtaining a state graph that represents a set of objects within an environment and a set of positions of the set of objects within the environment. The state graph includes a set of object nodes and a set of property nodes. The method also includes obtaining user input data. The user input data is generated based on a natural language input. The method further includes updating the state graph based on the user input data to generate an enhanced state graph. The enhanced state graph includes additional nodes generated based on the user input data. The method further includes providing the enhanced state graph to a planning module. The planning modules generates instructions for operating a mechanical system based on the enhanced state graph.
SYSTEM FOR INTERACTING WITH MACHINES USING NATURAL LANGUAGE INPUT
A method is provided. The method includes obtaining sensor data indicative of a set of objects detected within an environment. The method also includes generating a state graph based on the sensor data. The state graph includes a set of object nodes and a set of property nodes. The method further includes obtaining user input data generated based on a natural language input. The method further includes updating the state graph based on the user input data to generate an enhanced state graph. The enhanced state graph includes additional nodes generated based on the user input data. The method further includes generating a set of instructions for a set of mechanical systems based on the enhanced state graph. The method further includes operating the set of mechanical systems to achieve a set of objectives based on the set of instructions.
DEVICE AND IN PARTICULAR COMPUTER-IMPLEMENTED METHOD FOR DETERMINING A SIMILARITY BETWEEN DATA SETS
A device and a computer-implemented method, for determining a similarity between data sets. A first data set that includes a plurality of first embeddings, and a second data set that includes a plurality of second embeddings, are predefined. A first model is trained on the first data set, and a second model is trained on the second data set. A set of first features of the first model is determined on the second data set, which for each second embedding includes a feature of the first model, and a set of second features of the second model is determined on the second data set, which for each second embedding includes a feature of the second model. A map that optimally maps the set of first features onto the set of second features is determined. The similarity is determined as a function of a distance of the map from a reference.
COMPOSITE EMBEDDING SYSTEMS AND METHODS FOR MULTI-LEVEL GRANULARITY SIMILARITY RELEVANCE SCORING
Systems and methods for selecting items from a pool of items based on comparisons of composite embeddings are disclosed. An anchor embedding is generated for a target string. The anchor embedding is a composite embedding including at least a first initial embedding and a second initial embedding. An item embedding is obtained for each item in a pool of items. Each item embedding is a composite embedding including a first initial item embedding and a second initial item embedding. A similarity score is generated by comparing the item embedding to the anchor embedding for each item in the pool of items and a set of items is selected from the pool of items. The set of items includes a predetermined number of items in the pool of items having a highest similarity score.
Lossy data compressor for vehicle control systems
A lossy data compressor for physical measurement data, comprising a parametrized mapping network hat, when applied to a measurement data point x in a space X, produces a point z in a lower-dimensional manifold Z, and configured to provide a point z on manifold Z as output in response to receiving a data point x as input, wherein the manifold Z is a continuous hypersurface that only admits fully continuous paths between any two points on the hypersurface; and the parameters θ of the mapping network are trainable or trained towards an objective that comprises minimizing, on the manifold Z, a distance between a given prior distribution P.sub.Z and a distribution P.sub.Q induced on manifold Z by mapping a given set P.sub.D of physical measurement data from X onto Z using the mapping network, according to a given distance measure.
Malicious activity detection by cross-trace analysis and deep learning
Techniques are provided herein for contextual embedding of features of operational logs or network traffic for anomaly detection based on sequence prediction. In an embodiment, a computer has a predictive recurrent neural network (RNN) that detects an anomalous network flow. In an embodiment, an RNN contextually transcodes sparse feature vectors that represent log messages into dense feature vectors that may be predictive or used to generate predictive vectors. In an embodiment, graph embedding improves feature embedding of log traces. In an embodiment, a computer detects and feature-encodes independent traces from related log messages. These techniques may detect malicious activity by anomaly analysis of context-aware feature embeddings of network packet flows, log messages, and/or log traces.
RECRUITMENT PROCESS GRAPH BASED UNSUPERVISED ANOMALY DETECTION
In some examples, recruitment process graph based unsupervised anomaly detection may include obtaining log data associated with a recruitment process for a plurality of candidates, and generating knowledge graphs and graph embeddings. The graph embeddings may be trained to include a plurality of properties such that graph embeddings of genuine candidate hires and fraudulent candidate hires are appropriately spaced in a vector space. The trained graph embeddings may be clustered to generate a plurality of embedding clusters that include a genuine candidate cluster, and a fraudulent candidate cluster. For a new candidate graph embedding for a new candidate, a determination may be made as to whether the new candidate graph embedding belongs to the genuine candidate cluster, to the fraudulent candidate cluster, or to an anomalous cluster, and instructions may be generated to respectively retain or suspend the new candidate.