Patent classifications
G06F18/2185
Personal Data Discovery
Artificial-intelligence computer-implemented processes and machines predict whether personal data may be present in structured software based on metadata field(s) contained therein. Natural language processing preprocesses input strings corresponding to the metadata field(s) into normalized input sequence(s). Individual characters in the sequence(s) are embedded into fixed-dimension vectors of real numbers. Bidirectional LSTM(s) or other machine-learning algorithm(s) are utilized to generate forward and backward contextualization(s). Neural network output(s) are provided based on element-wise averaging or feed forwarding based on the contextualization(s) in order to predict whether one or more value fields corresponding to the metadata field(s) may contain personal data.
Knowledge sharing for machine learning systems
A machine learning system includes a coach machine learning system that uses machine learning to help a student machine learning system learn its system. By monitoring the student learning system, the coach machine learning system can learn (through machine learning techniques) “hyperparameters” for the student learning system that control the machine learning process for the student learning system. The machine learning coach could also determine structural modifications for the student learning system architecture. The learning coach can also control data flow to the student learning system.
Deal room platform using blockchain
A method for managing a deal room using a cryptographic ledger that includes a plurality of blocks that store information relating to a deal being hosted in the deal room, the method comprising: receiving a request to perform an operation with respect to the deal room from a remote computing device, wherein the request indicates a user that is requesting permission to perform the operation and a permission key corresponding to the user; determining a cryptographic hash of the operation specific permission key using a hash function; transmitting the cryptographic hash to a plurality of node computing device, wherein each node computing device stores at least a portion of the cryptographic ledger, and wherein the cryptographic ledger in part stores cryptographic hashes of operation specific permission keys that indicate permissions granted to respective users associated with the deal.
Object detection improvement based on autonomously selected training samples
A method for generating positive and negative training samples is presented. The method includes identifying false positive images of an object based on multiple images of an environment. The method also includes generating positive training samples from a set of images of the object. The method further includes generating a negative training sample from the false positive image. The method still further includes training an object detection system based on the positive training samples and the negative training sample.
Knowledge distillation for neural networks using multiple augmentation strategies
The present disclosure relates to systems, methods, and non-transitory computer readable media for accurately and efficiently learning parameters of a distilled neural network from parameters of a source neural network utilizing multiple augmentation strategies. For example, the disclosed systems can generate lightly augmented digital images and heavily augmented digital images. The disclosed systems can further learn parameters for a source neural network from the lightly augmented digital images. Moreover, the disclosed systems can learn parameters for a distilled neural network from the parameters learned for the source neural network. For example, the disclosed systems can compare classifications of heavily augmented digital images generated by the source neural network and the distilled neural network to transfer learned parameters from the source neural network to the distilled neural network via a knowledge distillation loss function.
REINFORCEMENT LEARNING SIMULATION OF SUPPLY CHAIN GRAPH
A computing system including a processor configured to receive training data including, for each of a plurality of training timesteps, training forecast states associated with respective training-phase agents included in a training supply chain graph. The processor may train a reinforcement learning simulation of the training supply chain graph using the training data via policy gradient reinforcement learning. At each training timestep, the training forecast states may be shared between simulations of the training-phase agents during training. The processor may receive runtime forecast states associated with respective runtime agents included in a runtime supply chain graph. For a runtime agent, at the trained reinforcement learning simulation, the processor may generate a respective runtime action output associated with a corresponding runtime forecast state of the runtime agent based at least in part on the runtime forecast states. The processor may output the runtime action output.
DETECTING SECRETS IN SOURCECODE
A method for facilitating identification of secrets in source code by using machine learning is provided. The method includes retrieving a plurality of files from a repository, each of the plurality of files including a source code file; parsing the source code file to identify a training feature; associating a predetermined label with the training feature, the predetermined label corresponding to a secret label and a non-secret label; training a model by using the training feature and the corresponding predetermined label; receiving, via a graphical user interface, a test file, the test file including a set of source codes; parsing the set of source codes to identify a feature; and determining, by using the model, a first characteristic of the feature.
MODEL PREDICTION CONFIDENCE UTILIZING DRIFT
Embodiments of systems and methods for model prediction confidence utilizing drift are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: identify drift with respect to an Artificial Intelligence (AI) or Machine Learning (ML) model; and adjust a confidence score of a prediction or inference produced by the AI/ML model based, at least in part, upon the drift.
ENHANCED DRIFT REMEDIATION WITH CAUSAL METHODS AND ONLINE MODEL MODIFICATION
Embodiments of systems and methods for enhanced drift remediation with causal methods and online model modification are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: detect drift in an Artificial Intelligence (AI) or Machine Learning (ML) model configured to make a prediction or a causal reasoning graphical or structural inference based upon input data, identify a root cause of the drift, and tag the input data with an indication of the root cause.
Robustness score for an opaque model
A method, system and computer-readable storage medium for performing a cognitive information processing operation. The cognitive information processing operation includes: receiving data from a plurality of data sources; processing the data from the plurality of data sources to provide cognitively processed insights via an augmented intelligence system, the augmented intelligence system executing on a hardware processor of an information processing system, the augmented intelligence system and the information processing system providing a cognitive computing function; performing a robustness assessment operation, the robustness assessment operation assessing robustness of the cognitive computing function, the robustness assessment operation generating a robustness score representing robustness of the cognitive computing function; and, providing the cognitively processed insights to a destination, the destination comprising a cognitive application, the cognitive application enabling a user to interact with the cognitive insights.