G06F18/2185

METHOD OF TRAINING DEEP LEARNING MODEL AND METHOD OF PROCESSING NATURAL LANGUAGE

A method of training a deep learning model, a method of processing a natural language, an electronic device, and a storage medium are provided, which relate to a field of artificial intelligence, in particular to deep learning technology and natural language processing technology. The method includes: inputting first sample data into a first deep learning model to obtain a first output result; training the first deep learning model according to the first output result and a first target output result, the first target output result is obtained by processing the first sample data using a reference deep learning model; inputting second sample data into a second deep learning model to obtain a second output result; and training the second deep learning model according to the second output result and a second target output result, to obtain a trained second deep learning model.

Systems and methods for response selection in multi-party conversations with dynamic topic tracking

Embodiments described herein provide a dynamic topic tracking mechanism that tracks how the conversation topics change from one utterance to another and use the tracking information to rank candidate responses. A pre-trained language model may be used for response selection in the multi-party conversations, which consists of two steps: (1) a topic-based pre-training to embed topic information into the language model with self-supervised learning, and (2) a multi-task learning on the pretrained model by jointly training response selection and dynamic topic prediction and disentanglement tasks.

Ontology matching based on weak supervision

A method is for matching a set of first classes assigned to a first data set with a set of second classes assigned to a second data set. The method includes constructing, via a set of pre-processing functions, a plurality of alignment profiles such that at least one alignment profile is assigned to each of the first classes and each of the second classes. The method includes generating a comparison matrix for each group of the alignment profiles, such that each group includes at least one of the first classes and at least one of the second classes. The method includes training a first machine learning model, through supervised training, based on the generated comparison matrices and based on probabilistic labels generated by a second machine learning model.

Artificial intelligence based fraud detection system

Embodiments detect fraud of risk targets that include both customer accounts and cashiers. Embodiments receive historical point of sale (“POS”) data and divide the POS data into store groupings. Embodiments create a first aggregation of the POS data corresponding to the customer accounts and a second aggregation of the POS data corresponding to the cashiers. Embodiments calculate first features corresponding to the customer accounts and second features corresponding to the cashiers. Embodiments filter the risk targets based on rules and separate the filtered risk targets into a plurality of data ranges. For each combination of store groupings and data ranges, embodiments train an unsupervised machine learning model. Embodiments then apply the unsupervised machine learning models after the training to generate first anomaly scores for each of the customer accounts and cashiers.

System and method for machine learning architecture for enterprise capitalization

Systems and methods are described in relation to specific technical improvements adapted for machine learning architectures that conduct classification on numerical and/or unstructured data. In an embodiment, two neural networks are utilized in concert to generate output data sets representative of predicted future states of an entity. A second learning architecture is trained to cluster prior entities based on characteristics converted into the form of features and event occurrence such that a boundary function can be established between the clusters to form a decision boundary between decision regions. These outputs are mapped to a space defined by the boundary function, such that the mapping can be used to determine whether a future state event is likely to occur at a particular time in the future.

PREDICTING A ROOT CAUSE OF AN ALERT USING A RECURRENT NEURAL NETWORK
20230045303 · 2023-02-09 ·

Aspects of the invention include detecting an error alert from a target computer system. In response to detecting the error alert, performance data is then retrieved from the target computer system. A gated recurrent unit (GRU) neural network is used to generate a prediction of a root cause of the error alert based on the performance data. The weights of a reset gate of the GRU neural network are adjusted based on received feedback of the prediction.

Predictive routing using machine learning in SD-WANs

In one embodiment, a supervisory service for a software-defined wide area network (SD-WAN) obtains telemetry data from one or more edge devices in the SD-WAN. The service trains, using the telemetry data as training data, a machine learning-based model to predict tunnel failures in the SD-WAN. The service receives feedback from the one or more edge devices regarding failure predictions made by the trained machine learning-based model. The service retrains the machine learning-based model, based on the received feedback.

PROCESSING INGESTED DATA TO IDENTIFY ANOMALIES

Systems and methods are described for processing ingested data in an asynchronous manner as the data is being ingested to detect potential anomalies. For example, one or more streaming data processors can convert data as the data is ingested into a comparable data structure, determine whether the comparable data structure should be assigned to an existing data pattern or a new data pattern, and optionally update a characteristic of the data pattern to which the comparable data structure is assigned. The streaming data processor(s) can perform these operations automatically in real-time or in periodic batches. Once one or more comparable data structures have been assigned to one or more data patterns, the streaming data processor(s) can analyze the comparable data structures assigned to a particular data pattern to determine whether any of the comparable data structures appear to be anomalous.

Method, System, and Computer Program Product for Detecting Fraudulent Interactions

A method for detecting fraudulent interactions may include receiving interaction data, including a first plurality of interactions with (first) fraud labels and a second plurality of interactions (without fraud labels). Second fraud label data for each of the second plurality of interactions may be generated with a first neural network (e.g., classifying whether each interaction is fraudulent or not). Generated interaction data and generated fraud label data may be generated with a second neural network. Discrimination data for each of the second plurality of interactions and generated interactions may be generated with a third neural network (e.g., classifying whether the respective interaction is real or not). Error data may be determined based on the discrimination data (e.g., whether the respective interaction is correctly classified). At least one of the neural networks may be trained based on the error data. A system and computer program product are also disclosed.

Virtual dialog system performance assessment and enrichment

Embodiments are provided that relate to a computer system, a computer program product, and a computer-implemented method for improving performance of a virtual dialog agent system employing an automated virtual dialog agent. Embodiments involve generating ground truth (GT) from a user's knowledge base, and leveraging the GT to evaluate how the virtual dialog agent performs with the GT. The evaluation measures quality of a multi-turn virtual dialog, and generates a remediation plan directed at an algorithmic improvement of the virtual dialog agent.