Patent classifications
G06F18/214
INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND RECORDING MEDIUM
An information processing device according to the present invention includes: a memory; and at least one processor coupled to the memory. The processor performs operations. The operations includes: selecting a base image from a base data set that is a set of images including a target region that includes an object that is a target of machine learning and a background region that does not include an object that is a target of the machine learning; generating a processing target image that is a duplicate of the selected base image; selecting the target region included in another image included in the base data set; synthesizing an image of the selected target region with the processing target image; and generating a data set that is a set of the processing target images in which a predetermined number of the target regions are synthesized.
METHOD OF TRAINING DEEP LEARNING MODEL AND METHOD OF PROCESSING NATURAL LANGUAGE
A method of training a deep learning model, a method of processing a natural language, an electronic device, and a storage medium are provided, which relate to a field of artificial intelligence, in particular to deep learning technology and natural language processing technology. The method includes: inputting first sample data into a first deep learning model to obtain a first output result; training the first deep learning model according to the first output result and a first target output result, the first target output result is obtained by processing the first sample data using a reference deep learning model; inputting second sample data into a second deep learning model to obtain a second output result; and training the second deep learning model according to the second output result and a second target output result, to obtain a trained second deep learning model.
IoT MALWARE CLASSIFICATION AT A NETWORK DEVICE
- Madhusoodhana Chari SESHA ,
- Ramasamy APATHOTHARANAN ,
- Shree Phani Sundara BANAVATHI NARAYANA SASTRY ,
- Priyanka Chandrashekar BHAT ,
- Venkatesh MADI ,
- Srinidhi HARI PRASAD ,
- Azath Abdul SAMADH ,
- Kumar SURESH ,
- Manjunath Rajendra BATAKURKI ,
- Madhumitha RAJAMOHAN ,
- Ganesh PAGOTI ,
- Sriram MAHADEVA ,
- Karthik ARUMUGAM ,
- Harish RAMACHANDRAN ,
- Fahad KAMEEZ
Some examples relate to classifying IoT malware at a network device. An example includes receiving, by a network device, network traffic from an Internet of Things (IoT) device. Network device may analyze network parameters from the network traffic with a machine learning model. In response to analyzing, network device may classify the network traffic into a category of malware activity. Network device may determine an effectiveness of network traffic classification by measuring a deviation of the network parameters from previously trained network parameters that were used for training the machine learning model. In response to a determination that the deviation of the network parameters from the trained network parameters is more than a pre-defined threshold, network device may generate an alert highlighting the deviation, which allows a user to perform a remedial action pertaining to the IoT device.
PART INSPECTION SYSTEM HAVING GENERATIVE TRAINING MODEL
A part inspection system includes a vision device configured to image a part being inspected and generate a digital image of the part. The system includes a part inspection module communicatively coupled to the vision device and receives the digital image of the part as an input image. The part inspection module includes a defect detection model. The defect detection model includes a template image. The defect detection model compares the input image to the template image to identify defects. The defect detection model generates an output image. The defect detection model configured to overlay defect identifiers on the output image at the identified defect locations, if any.
SYSTEMS, MEDIA, AND METHODS FOR UTILIZING A CROSSWALK ALGORITHM TO IDENTIFY CONTROLS ACROSS FRAMEWORKS, AND FOR UTILIZING IDENTIFIED CONTROLS TO GENERATE CYBERSECURITY RISK ASSESSMENTS
In one or more embodiments, the disclosed systems, methods, and media include utilizing a crosswalk algorithm to identify controls (e.g., cybersecurity controls) across frameworks, and for utilizing identified controls to generate cybersecurity risk assessments. A cybersecurity module may identify one or more controls in a data structure. The process may utilize a crosswalk algorithm to determine a relatedness between the identified controls and different controls of different frameworks. The process may update the data structure with selected different controls, such that a more robust set of controls are identified when the cybersecurity module indexes into the data structure to identify particular controls. Additionally, the process may generate a risk assessment for a device/software. The process may generate a risk score for the risk assessment, and the risk score may be based on a determined compliance level for each control determined to be related to a defined risk of interest.
Making an Enabled Capability
Various embodiments relate to network capabilities. Devices of a network can have different capabilities. The network can provide artificial intelligence (AI) enabled, machine learning (ML) enabled, deep learning (DL) enabled networked access to these capabilities. The capabilities can share a common AI/ML/DL-enabled open layer-based net-centric logical protocol architecture. Also, different features can be achieved through different layers. As an example, AI enabled access can be achieved through the application layer, ML enabled access and DL enabled access can be achieved through the presentation layer and the session layer, and network access is achieved through the transport layer, the network layer, the link layer, and the physical layer.
Messaging system with augmented reality makeup
Systems, methods, and computer readable media for messaging system with augmented reality (AR) makeup are presented. Methods include processing a first image to extract a makeup portion of the first image, the makeup portion representing the makeup from the first image and training a neural network to process images of people to add AR makeup representing the makeup from the first image. The methods may further include receiving, via a messaging application implemented by one or more processors of a user device, input that indicates a selection to add the AR makeup to a second image of a second person. The methods may further include processing the second image with the neural network to add the AR makeup to the second image and causing the second image with the AR makeup to be displayed on a display device of the user device.
Semantic labeling of point clouds using images
Systems and methods for semantic labeling of point clouds using images. Some implementations may include obtaining a point cloud that is based on lidar data reflecting one or more objects in a space; obtaining an image that includes a view of at least one of the one or more objects in the space; determining a projection of points from the point cloud onto the image; generating, using the projection, an augmented image that includes one or more channels of data from the point cloud and one or more channels of data from the image; inputting the augmented image to a two dimensional convolutional neural network to obtain a semantic labeled image wherein elements of the semantic labeled image include respective predictions; and mapping, by reversing the projection, predictions of the semantic labeled image to respective points of the point cloud to obtain a semantic labeled point cloud.
Technique for training a prediction apparatus
A technique is provided for training a prediction apparatus. The apparatus has an input interface for receiving a sequence of training events indicative of program instructions, and identifier value generation circuitry for performing an identifier value generation function to generate, for a given training event received at the input interface, an identifier value for that given training event. The identifier value generation function is arranged such that the generated identifier value is dependent on at least one register referenced by a program instruction indicated by that given training event. Prediction storage is provided with a plurality of training entries, where each training entry is allocated an identifier value as generated by the identifier value generation function, and is used to maintain training data derived from training events having that allocated identifier value. Matching circuitry is then responsive to the given training event to detect whether the prediction storage has a matching training entry (i.e. an entry whose allocated identifier value matches the identifier value for the given training event). If so, it causes the training data in the matching training entry to be updated in dependence on the given training event.
Domain adaptation of deep neural networks
Disclosed herein are system, method, and computer program product embodiments for adapting machine learning models for use in additional applications. For example, feature extraction models are readily available for use in applications such as image detection. These feature extraction models can be used to label inputs (such as images) in conjunction with other deep neural network models. However, in adapting the feature extraction models to these uses, it becomes problematic to improve the quality of their results on target data sets, as these feature extraction models are large and resistant to retraining. Approaches disclosed herein include a transfer layer for providing fast retraining of machine learning models.