G06N20/20

SYSTEMS AND METHODS FOR AI INFERENCE PLATFORM

System and method for using and managing artificial intelligence (AI) inference platform (AIP) and/or model orchestrators according to certain embodiments. For example, a method includes receiving sensor data via a data interface of a model orchestrator, the model orchestrator including an indication of a model pipeline, the model pipeline including a plurality of models; loading the plurality of models according to the model pipeline; applying the model pipeline to the received sensor data; receiving a model output from the model pipeline via a model interface of the model orchestrator; and generating an insight based at least in part on the model output.

SYSTEMS AND METHODS FOR AI INFERENCE PLATFORM

System and method for using and managing artificial intelligence (AI) inference platform (AIP) and/or model orchestrators according to certain embodiments. For example, a method includes receiving sensor data via a data interface of a model orchestrator, the model orchestrator including an indication of a model pipeline, the model pipeline including a plurality of models; loading the plurality of models according to the model pipeline; applying the model pipeline to the received sensor data; receiving a model output from the model pipeline via a model interface of the model orchestrator; and generating an insight based at least in part on the model output.

LOCATION INTELLIGENCE FOR BUILDING EMPATHETIC DRIVING BEHAVIOR TO ENABLE L5 CARS
20230052339 · 2023-02-16 ·

System and methods enable vehicles to make ethical/empathetic driving decisions by using deep learning aided location intelligence. The systems and methods identify moral islands/complex driving scenarios where a complex ethical decision is required. A Generative Adversarial Network (GAN) is used to generate synthetic training data to capture varied ethically complex driving situations. Embodiments train a deep learning model (ETHNET) that is configured to output one or more driving decisions to be taken when a vehicle comes across an ethically complex driving situations in the real world.

Subject-Level Granular Differential Privacy in Federated Learning
20230052231 · 2023-02-16 ·

Group-level privacy preservation is implemented within federated machine learning. An aggregation server may distribute a machine learning model to multiple users each including respective private datasets. The private datasets may individually include multiple items associated with a single group. Individual users may train the model using their local, private dataset to generate one or more parameter updates and to determine a count of the largest number of items associated with any single group of a number of groups in the dataset. Parameter updates generated by the individual users may be modified by applying respective noise values to individual ones of the parameter updates according to the respective counts to ensure differential privacy for the groups of the dataset. The aggregation server may aggregate the updates into a single set of parameter updates to update the machine learning model.

Subject-Level Granular Differential Privacy in Federated Learning
20230052231 · 2023-02-16 ·

Group-level privacy preservation is implemented within federated machine learning. An aggregation server may distribute a machine learning model to multiple users each including respective private datasets. The private datasets may individually include multiple items associated with a single group. Individual users may train the model using their local, private dataset to generate one or more parameter updates and to determine a count of the largest number of items associated with any single group of a number of groups in the dataset. Parameter updates generated by the individual users may be modified by applying respective noise values to individual ones of the parameter updates according to the respective counts to ensure differential privacy for the groups of the dataset. The aggregation server may aggregate the updates into a single set of parameter updates to update the machine learning model.

METHODS AND COMPUTER SYSTEMS FOR AUTOMATED EVENT DETECTION BASED ON MACHINE LEARNING

A computer system includes a memory configured to store instructions, and one or more processors configured to execute the instructions to cause the computer system to perform a method for event detection. The method includes obtaining a user profile and a persona category associated with the user profile corresponding to a user; receiving first data associated with the user and second data associated with one or more environmental or situational factors; detecting an event based on the first data or the second data; and querying a database in response to the detected event to determine one or more recommended actions for the user based on the user profile and the persona category of the user.

SYSTEMS AND METHODS FOR AUTOMATICALLY BUILDING A MACHINE LEARNING MODEL
20230048301 · 2023-02-16 ·

Systems and methods for automatically building a machine learning model are disclosed. A plurality of variables is displayed via a graphical user interface (GUI). A target variable and a first independent variable are identified from the plurality of variables. A parameter associated with the machine learning model is identified. Collected data is received via the GUI. A first machine learning model is built using as inputs, the parameter and the collected data associated with the first independent variable and the target variable. A change is made to at least a portion of the inputs used to build the first machine learning model. A second machine learning model is built based on the change. A prediction accuracy of the first machine learning model is compared to the prediction accuracy of the second machine learning model. Either the first or second machine learning model is selected based on the prediction accuracy.

SYSTEMS AND METHODS FOR AUTOMATICALLY BUILDING A MACHINE LEARNING MODEL
20230048301 · 2023-02-16 ·

Systems and methods for automatically building a machine learning model are disclosed. A plurality of variables is displayed via a graphical user interface (GUI). A target variable and a first independent variable are identified from the plurality of variables. A parameter associated with the machine learning model is identified. Collected data is received via the GUI. A first machine learning model is built using as inputs, the parameter and the collected data associated with the first independent variable and the target variable. A change is made to at least a portion of the inputs used to build the first machine learning model. A second machine learning model is built based on the change. A prediction accuracy of the first machine learning model is compared to the prediction accuracy of the second machine learning model. Either the first or second machine learning model is selected based on the prediction accuracy.

CYBER THREAT INFORMATION PROCESSING APPARATUS, CYBER THREAT INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM STORING CYBER THREAT INFORMATION PROCESSING PROGRAM

Provided are a cyber threat information processing apparatus, a method thereof, and a storage medium storing a cyber threat information processing program. It is possible to provide a cybersecurity threat information processing method including disassembling an input executable file to obtain disassembled code, and reconstructing the disassembled code to obtain reconstructed disassembled code, into a hash function, and converting the hash function into N-gram data (N being a natural number), and performing ensemble machine learning on block-unit code of the converted N-gram data to profile the block-unit code by an identifier of an attack technique performed by the block-unit code and an identifier of an attacker generating the block-unit code. It is possible to detect and address a variant of malware, and identify malware, an attack technique, an attacker, and an attack prediction method within a significantly short time even for a variant of malware.

CYBER THREAT INFORMATION PROCESSING APPARATUS, CYBER THREAT INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM STORING CYBER THREAT INFORMATION PROCESSING PROGRAM

Provided are a cyber threat information processing apparatus, a method thereof, and a storage medium storing a cyber threat information processing program. It is possible to provide a cybersecurity threat information processing method including disassembling an input executable file to obtain disassembled code, and reconstructing the disassembled code to obtain reconstructed disassembled code, into a hash function, and converting the hash function into N-gram data (N being a natural number), and performing ensemble machine learning on block-unit code of the converted N-gram data to profile the block-unit code by an identifier of an attack technique performed by the block-unit code and an identifier of an attacker generating the block-unit code. It is possible to detect and address a variant of malware, and identify malware, an attack technique, an attacker, and an attack prediction method within a significantly short time even for a variant of malware.