-
公开(公告)号:US20210067549A1
公开(公告)日:2021-03-04
申请号:US17004752
申请日:2020-08-27
Applicant: NEC Laboratories America, Inc.
Inventor: Zhengzhang Chen , Jiaping Gui , Haifeng Chen , Junghwan Rhee , Shen Wang
Abstract: Methods and systems for detecting and responding to an intrusion in a computer network include generating an adversarial training data set that includes original samples and adversarial samples, by perturbing one or more of the original samples with an integrated gradient attack to generate the adversarial samples. The original and adversarial samples are encoded to generate respective original and adversarial graph representations, based on node neighborhood aggregation. A graph-based neural network is trained to detect anomalous activity in a computer network, using the adversarial training data set. A security action is performed responsive to the detected anomalous activity.
-
公开(公告)号:US20210065735A1
公开(公告)日:2021-03-04
申请号:US16997314
申请日:2020-08-19
Applicant: NEC Laboratories America, Inc.
Inventor: Cristian Lumezanu , Yuncong Chen , Dongjin Song , Takehiko Mizuguchi , Haifeng Chen , Bo Dong
Abstract: A method is provided. Intermediate audio features are generated from an input acoustic sequence. Using a nearest neighbor search, segments of the input acoustic sequence are classified based on the intermediate audio features to generate a final intermediate feature as a classification for the input acoustic sequence. Each segment corresponds to a respective different acoustic window. The generating step includes learning the intermediate audio features from Multi-Frequency Cepstral Component (MFCC) features extracted from the input acoustic sequence. The generating step includes dividing the same scene into the different acoustic windows having varying MFCC features. The generating step includes feeding the MFCC features of each of the different acoustic windows into respective LSTM units such that a hidden state of each respective LSTM unit is passed through an attention layer to identify feature correlations between hidden states at different time steps corresponding to different ones of the different acoustic windows.
-
143.
公开(公告)号:US20210065059A1
公开(公告)日:2021-03-04
申请号:US17002960
申请日:2020-08-26
Applicant: NEC Laboratories America, Inc.
Inventor: Dongjin Song , Yuncong Chen , Cristian Lumezanu , Takehiko Mizoguchi , Haifeng Chen , Dixian Zhu
Abstract: A computer-implemented method for monitoring computing system status by implementing a deep unsupervised binary coding network includes receiving multivariate time series data from one or more sensors associated with a system, implementing a long short-term memory (LSTM) encoder-decoder framework to capture temporal information of different time steps within the multivariate time series data and perform binary coding, the LSTM encoder-decoder framework including a temporal encoding mechanism, a clustering loss and an adversarial loss, computing a minimal distance from the binary code to historical data, and obtaining a status determination of the system based on a similar pattern analysis using the minimal distance.
-
公开(公告)号:US20210064959A1
公开(公告)日:2021-03-04
申请号:US16998280
申请日:2020-08-20
Applicant: NEC Laboratories America, Inc.
Inventor: Jiaping Gui , Zhengzhang Chen , Junghwan Rhee , Haifeng Chen , Pengyang Wang
IPC: G06N3/04
Abstract: Systems and methods for predicting road conditions and traffic volume is provided. The method includes generating a graph of one or more road regions including a plurality of road intersections and a plurality of road segments, wherein the road intersections are represented as nodes and the road segments are represented as edges. The method can also include embedding the nodes from the graph into a node space, translating the edges of the graph into nodes of a line graph, and embedding the nodes of the line graph into the node space. The method can also include aligning the nodes from the line graph with the nodes from the graph, and optimizing the alignment, outputting a set of node and edge representations that predicts the traffic flow for each of the road segments and road intersections based on the optimized alignment of the nodes.
-
公开(公告)号:US10931635B2
公开(公告)日:2021-02-23
申请号:US16146166
申请日:2018-09-28
Applicant: NEC Laboratories America, Inc. , NEC Corporation
Inventor: Junghwan Rhee , Hongyu Li , Shuai Hao , Chung Hwan Kim , Zhenyu Wu , Zhichun Li , Kangkook Jee , Lauri Korts-Parn
Abstract: Systems and methods for an automotive security gateway include an in-gateway security system that monitors local host behaviors in vehicle devices to identify anomalous local host behaviors using a blueprint model trained to recognize secure local host behaviors. An out-of-gateway security system monitors network traffic across remote hosts, local devices, hotspot network, and in-car network to identify anomalous behaviors using deep packet inspection to inspect packets of the network. A threat mitigation system issues threat mitigation instructions corresponding to the identified anomalous local host behaviors and the anomalous remote host behaviors to secure the vehicle devices by removing the identified anomalous local host behaviors and the anomalous remote host behaviors. Automotive security gateway services and vehicle electronic control units operate the vehicle devices according to the threat mitigation instructions.
-
公开(公告)号:US10931352B2
公开(公告)日:2021-02-23
申请号:US16591070
申请日:2019-10-02
Applicant: NEC Laboratories America, Inc.
Inventor: Shahram Shahsavari , Mohammad Khojastepour
IPC: H04B7/06
Abstract: A method for establishing communication links in a millimeter wave network is presented. The method includes determining an active communication link between first and second devices, the first device transmitting probing packets to the second device, employing a beam search technique to locate narrow beams by triggering the first device to adjust its transmission pattern to cover a fraction of an angular uncertainty region (AUR) at a beginning of a time-slot, and adjusting transmission coefficients of the first device based on a response received from the second device such that if the second device receives a probing packet, the second device sends an acknowledgment packet to the first device and the first device updates the AUR such that the AUR is set to a probed angular interval, and if the second device does not receive the probing packet, the first device updates the AUR to a complementary part of the probed interval.
-
公开(公告)号:US10930301B1
公开(公告)日:2021-02-23
申请号:US16997314
申请日:2020-08-19
Applicant: NEC Laboratories America, Inc.
Inventor: Cristian Lumezanu , Yuncong Chen , Dongjin Song , Takehiko Mizuguchi , Haifeng Chen , Bo Dong
Abstract: A method is provided. Intermediate audio features are generated from an input acoustic sequence. Using a nearest neighbor search, segments of the input acoustic sequence are classified based on the intermediate audio features to generate a final intermediate feature as a classification for the input acoustic sequence. Each segment corresponds to a respective different acoustic window. The generating step includes learning the intermediate audio features from Multi-Frequency Cepstral Component (MFCC) features extracted from the input acoustic sequence. The generating step includes dividing the same scene into the different acoustic windows having varying MFCC features. The generating step includes feeding the MFCC features of each of the different acoustic windows into respective LSTM units such that a hidden state of each respective LSTM unit is passed through an attention layer to identify feature correlations between hidden states at different time steps corresponding to different ones of the different acoustic windows.
-
公开(公告)号:US10929763B2
公开(公告)日:2021-02-23
申请号:US15684293
申请日:2017-08-23
Applicant: NEC Laboratories America, Inc.
Inventor: Jianwu Xu , Biplob Debnath , Bo Zong , Hui Zhang , Guofei Jiang , Hancheng Ge
Abstract: A heterogeneous log pattern editing recommendation system and computer-implemented method are provided. The system has a processor configured to identify, from heterogeneous logs, patterns including variable fields and constant fields. The processor is also configured to extract a category feature, a cardinality feature, and a before-after n-gram feature by tokenizing the variable fields in the identified patterns. The processor is additionally configured to generate target similarity scores between target fields to be potentially edited and other fields from among the variable fields in the heterogeneous logs using pattern editing operations based on the extracted category feature, the extracted cardinality feature, and the extracted before-after n-gram feature. The processor is further configured to recommend, to a user, log pattern edits for at least one of the target fields based on the target similarity scores between the target fields in the heterogeneous logs.
-
149.
公开(公告)号:US20210042937A1
公开(公告)日:2021-02-11
申请号:US16939604
申请日:2020-07-27
Applicant: NEC Laboratories America, Inc.
Inventor: Pan Ji , Quoc-Huy Tran , Manmohan Chandraker , Yuliang Zou
Abstract: A computer-implemented method for implementing a self-supervised visual odometry framework using long-term modeling includes, within a pose network of the self-supervised visual odometry framework including a plurality of pose encoders, a convolution long short-term memory (ConvLSTM) module having a first-layer ConvLSTM and a second-layer ConvLSTM, and a pose prediction layer, performing a first stage of training over a first image sequence using photometric loss, depth smoothness loss and pose cycle consistency loss, and performing a second stage of training to finetune the second-layer ConvLSTM over a second image sequence longer than the first image sequence.
-
公开(公告)号:US10915535B2
公开(公告)日:2021-02-09
申请号:US15983404
申请日:2018-05-18
Applicant: NEC Laboratories America, Inc.
Inventor: Haifeng Chen , Youfu Li , Daeki Cho , Bo Zong , Nipun Arora , Cristian Lumezanu
IPC: G06F16/2455 , G06N20/00 , G06F16/22 , G06F16/2453 , G06N5/04
Abstract: Systems and methods for optimizing query execution to improve query processing by a computer are provided. A query is analyzed and translated into a logical plan. A runtime query optimizer is applied to the logical plan to identify a physical plan including operators for execution. The logical plan is translated into the physical plan. Execution of the query is scheduled according to the physical plan.
-
-
-
-
-
-
-
-
-