Patent classifications
G06N5/01
IoT MALWARE CLASSIFICATION AT A NETWORK DEVICE
- Madhusoodhana Chari SESHA ,
- Ramasamy APATHOTHARANAN ,
- Shree Phani Sundara BANAVATHI NARAYANA SASTRY ,
- Priyanka Chandrashekar BHAT ,
- Venkatesh MADI ,
- Srinidhi HARI PRASAD ,
- Azath Abdul SAMADH ,
- Kumar SURESH ,
- Manjunath Rajendra BATAKURKI ,
- Madhumitha RAJAMOHAN ,
- Ganesh PAGOTI ,
- Sriram MAHADEVA ,
- Karthik ARUMUGAM ,
- Harish RAMACHANDRAN ,
- Fahad KAMEEZ
Some examples relate to classifying IoT malware at a network device. An example includes receiving, by a network device, network traffic from an Internet of Things (IoT) device. Network device may analyze network parameters from the network traffic with a machine learning model. In response to analyzing, network device may classify the network traffic into a category of malware activity. Network device may determine an effectiveness of network traffic classification by measuring a deviation of the network parameters from previously trained network parameters that were used for training the machine learning model. In response to a determination that the deviation of the network parameters from the trained network parameters is more than a pre-defined threshold, network device may generate an alert highlighting the deviation, which allows a user to perform a remedial action pertaining to the IoT device.
LOCATION INTELLIGENCE FOR BUILDING EMPATHETIC DRIVING BEHAVIOR TO ENABLE L5 CARS
System and methods enable vehicles to make ethical/empathetic driving decisions by using deep learning aided location intelligence. The systems and methods identify moral islands/complex driving scenarios where a complex ethical decision is required. A Generative Adversarial Network (GAN) is used to generate synthetic training data to capture varied ethically complex driving situations. Embodiments train a deep learning model (ETHNET) that is configured to output one or more driving decisions to be taken when a vehicle comes across an ethically complex driving situations in the real world.
METHODS AND COMPUTER SYSTEMS FOR AUTOMATED EVENT DETECTION BASED ON MACHINE LEARNING
A computer system includes a memory configured to store instructions, and one or more processors configured to execute the instructions to cause the computer system to perform a method for event detection. The method includes obtaining a user profile and a persona category associated with the user profile corresponding to a user; receiving first data associated with the user and second data associated with one or more environmental or situational factors; detecting an event based on the first data or the second data; and querying a database in response to the detected event to determine one or more recommended actions for the user based on the user profile and the persona category of the user.
CYBER THREAT INFORMATION PROCESSING APPARATUS, CYBER THREAT INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM STORING CYBER THREAT INFORMATION PROCESSING PROGRAM
Provided are a cyber threat information processing apparatus, a method thereof, and a storage medium storing a cyber threat information processing program. It is possible to provide a cybersecurity threat information processing method including disassembling an input executable file to obtain disassembled code, and reconstructing the disassembled code to obtain reconstructed disassembled code, into a hash function, and converting the hash function into N-gram data (N being a natural number), and performing ensemble machine learning on block-unit code of the converted N-gram data to profile the block-unit code by an identifier of an attack technique performed by the block-unit code and an identifier of an attacker generating the block-unit code. It is possible to detect and address a variant of malware, and identify malware, an attack technique, an attacker, and an attack prediction method within a significantly short time even for a variant of malware.
USING EMAIL HISTORY TO ESTIMATE CREDITWORTHINESS FOR APPLICANTS HAVING INSUFFICIENT CREDIT HISTORY
In some implementations, a credit decision platform may receive a credit request from an applicant and obtain domestic historical data associated with the applicant from a credit bureau device. The credit decision platform may obtain access to an email account associated with the applicant based on determining that the domestic historical data associated with the applicant is insufficient to process the credit request. The credit decision platform may identify, using one or more machine learning models, a set of email messages included in the email account that are relevant to the credit request and may analyze content included in the set of email messages to generate non-domestic historical data associated with the applicant. The credit decision platform may generate a decision on the credit request based on an estimated creditworthiness of the applicant, which may be determined based on the non-domestic historical data.
PREDICTIVE CLASSIFICATION MODEL FOR AUTO-POPULATION OF TEXT BLOCK TEMPLATES INTO AN APPLICATION
Methods, systems, and computer-readable media are disclosed herein that provide for a machine learning classification model that is trained with historical data and which, by ingesting minimal test data from a particular instance of the application, predictively determines an existing text block that is most relevant for that particular instance of the application. When determined by the model, a particular template is auto-populated into a free text input box within the application for presentation in a graphical user interface.
DEEP NEURAL NETWORK FOR DETECTING OBSTACLE INSTANCES USING RADAR SENSORS IN AUTONOMOUS MACHINE APPLICATIONS
In various examples, a deep neural network(s) (e.g., a convolutional neural network) may be trained to detect moving and stationary obstacles from RADAR data of a three dimensional (3D) space. In some embodiments, ground truth training data for the neural network(s) may be generated from LIDAR data. More specifically, a scene may be observed with RADAR and LIDAR sensors to collect RADAR data and LIDAR data for a particular time slice. The RADAR data may be used for input training data, and the LIDAR data associated with the same or closest time slice as the RADAR data may be annotated with ground truth labels identifying objects to be detected. The LIDAR labels may be propagated to the RADAR data, and LIDAR labels containing less than some threshold number of RADAR detections may be omitted. The (remaining) LIDAR labels may be used to generate ground truth data.
CLOUD-BASED SYSTEMS FOR OPTIMIZED MULTI-DOMAIN PROCESSING OF INPUT PROBLEMS USING MACHINE LEARNING SOLVER TYPE SELECTION
Various embodiments of the present disclosure provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for determining optimized solutions to input problems in a containerized, cloud-based (e.g., serverless) manner. In one embodiment, an example method is provided. The method comprises: receiving a problem type of an input problem originating from a client computing entity; mapping the problem type to one or more selected solver types; generating one or more container instances of one or more compute containers, each compute container corresponding to a selected solver type; generating a problem output using the one or more container instances; and providing the problem output comprising a solution to the input problem to the client computing entity. In various embodiments, optimized solutions for input problems are determined using a cloud-based multi-domain solver system configured to dynamically allocate computing and processing resources between different solution-determining tasks.
INFORMATION QUALITY OF MACHINE LEARNING MODEL OUTPUTS
Some embodiments of the present application include obtaining datasets including a plurality of features and computing a correlation score between each of the features. Based on the correlation scores, the features may be clustered together such that each cluster includes features that are correlated with one another, and features included in different feature clusters lack correlation with one another. A machine learning model may be selected based on a set of input features for the model and the plurality of clusters such that each input feature is included in one of the feature clusters and no feature cluster includes more than one of the input features. Datasets may then be selected based on the set of input features, which may be used to generate training data for training the machine learning model.
QUANTUM SIMULATION
A method for reducing computation time while simulating quantum computation on a classical computer by performing an algorithm used to determine the most efficient input contraction, the method including receiving, by a processor, a tensor network representing a quantum circuit, computing, by the processor, an ordering for the tensor network by an ordering algorithm, contracting, by the processor, the tensor network by eliminating indices according to the ordering resulting in a contracted tensor network, and returning, by the processor, the contracted tensor network.