-
公开(公告)号:US10929453B2
公开(公告)日:2021-02-23
申请号:US16522727
申请日:2019-07-26
Applicant: NEC Laboratories America, Inc.
Inventor: Christopher Malon
Abstract: A system verifies textual claims using a document corpus. The system includes a memory for storing program code and a processor device for running the code to retrieve documents from the corpus based on Term Frequency Inverse Document Frequency (TFIDF) similarity to a set of textual claims. The processor extracts named entities and capitalized phrases from the textual claims. The processor retrieves documents from the corpus with titles matching any of the extracted named entities and capitalized phrases. The processor extracts premise sentences from the retrieved documents. The processor classifies the premise sentences together with sources of the premises sentences against the textual claims to obtain classifications from among possible classifications including a supported, an unverified, or a contradicted classification. The processor aggregates the classifications over the premise sentences to selectively output, for each textual claim, an overall decision of the supported classification, the unverified classification, or the contradicted classification.
-
公开(公告)号:US10929220B2
公开(公告)日:2021-02-23
申请号:US16245740
申请日:2019-01-11
Applicant: NEC Laboratories America, Inc.
Inventor: Dongjin Song , Ning Xia , Haifeng Chen
Abstract: Methods and systems for detecting and correcting anomalous behavior include generating a joint binary embedding of each of a set of historical time series sequences. A joint binary embedding of a recent time series sequence is generated. A ranked list of the plurality of historical time series sequences is generated according to respective similarities of each historical time series sequence to the recent time series sequence based on the respective joint binary embeddings of each. Anomalous behavior of a system associated with the recent time series sequence is determined according to a label of a top-ranked historical time series sequence in the ranked list. A corrective action is performed to correct the anomalous behavior.
-
公开(公告)号:US10915626B2
公开(公告)日:2021-02-09
申请号:US16161769
申请日:2018-10-16
Applicant: NEC Laboratories America, Inc.
Inventor: LuAn Tang , Zhengzhang Chen , Zhichun Li , Zhenyu Wu , Jumpei Kamimura , Haifeng Chen
Abstract: A computer-implemented method for implementing alert interpretation in enterprise security systems is presented. The computer-implemented method includes employing a plurality of sensors to monitor streaming data from a plurality of computing devices, generating alerts based on the monitored streaming data, and employing an alert interpretation module to interpret the alerts in real-time, the alert interpretation module including a process-star graph constructor for retrieving relationships from the streaming data to construct process-star graph models and an alert cause detector for analyzing the alerts based on the process-star graph models to determine an entity that causes an alert.
-
174.
公开(公告)号:US20210012061A1
公开(公告)日:2021-01-14
申请号:US16918257
申请日:2020-07-01
Applicant: NEC Laboratories America, Inc. , NEC Corporation
Inventor: Yuncong Chen , Dongjin Song , Cristian Lumezanu , Haifeng Chen , Takehiko Mizoguchi
IPC: G06F40/166 , G06F16/23 , G06N3/04 , G06N3/08 , G06F40/30
Abstract: A system for cross-modal data retrieval is provided which includes a neural network having a time series encoder and text encoder jointly trained based on a triplet loss relating to two different modalities of (i) time series and (ii) free-form text comments. A database stores training sets with feature vectors extracted from encodings of the training sets. The encodings are obtained by encoding the time series using the time series encoder and encoding the text comments using the text encoder. A processor retrieves the feature vectors corresponding to at least one of the modalities from the database for insertion into a feature space together with a feature vector corresponding to a testing input relating to at least one of a testing time series and a testing free-form text comment, determines a set of nearest neighbors from among the feature vectors based on distance criteria, and outputs testing results.
-
公开(公告)号:US10885027B2
公开(公告)日:2021-01-05
申请号:US15684273
申请日:2017-08-23
Applicant: NEC Laboratories America, Inc.
Inventor: Xusheng Xiao , Zhichun Li , Mu Zhang , Guofei Jiang , Jiaping Gui
IPC: G06F16/2453 , G06F21/62 , G06F16/245 , G06F21/57 , G06F16/22
Abstract: Methods for querying a database and database systems include optimizing a database query for parallel execution using spatial and temporal information relating to elements in the database, the optimized database query being split into sub-queries with sub-queries being divided spatially according to host and temporally according to time window. The sub-queries are executed in parallel. The results of the database query are outputted progressively.
-
公开(公告)号:US10884433B2
公开(公告)日:2021-01-05
申请号:US16100479
申请日:2018-08-10
Applicant: NEC Laboratories America, Inc.
Inventor: Quoc-Huy Tran , Manmohan Chandraker , Hyo Jin Kim
IPC: G05D1/08 , G06T7/73 , G05D1/00 , G08G5/04 , B64C39/02 , G08G5/00 , G06N3/04 , G06N3/08 , G06N5/04 , G06T7/00 , G06F16/29 , G01C21/32
Abstract: A computer-implemented method, system, and computer program product are provided for a stabilization system utilizing pose estimation in an aerial drone. The method includes receiving, by a pose estimation system, a plurality of images from one or more cameras. The method also includes predicting, by the pose estimation system, a pose from the score map and a combined feature map, the combined feature map correlated from a pair of the plurality of images. The method additionally includes moving, by a propulsion system, the aerial drone responsive to the pose.
-
公开(公告)号:US10883345B2
公开(公告)日:2021-01-05
申请号:US16034663
申请日:2018-07-13
Applicant: NEC Laboratories America, Inc.
Inventor: Jianwu Xu , Tanay Kumar Saha , Haifeng Chen , Hui Zhang
IPC: G06F16/45 , E21B43/08 , B01D29/21 , B01D39/20 , B01D29/11 , B01D29/33 , G06F16/22 , G06F16/28 , G06F16/26 , G06F7/08
Abstract: A method and system are provided for processing computer log messages for log visualization and log retrieval. The method includes collecting log messages from one or more computer system components, performing a log tokenization process on the log messages to generate tokens, transforming the tokens into log vectors associated with a metric space, performing dimensionality reduction on the metric space to project the metric space into a lower dimensional sub-space, storing similarity distances between respective pairs of the log vectors, and in response to receiving a query associated with a query log message for reducing operational inefficiencies of the one or more computer system components, employing the similarity distances to retrieve one or more similar log messages corresponding to the query log message for reducing the operational inefficiencies of the one or more computer system components.
-
公开(公告)号:US10853627B2
公开(公告)日:2020-12-01
申请号:US16145537
申请日:2018-09-28
Applicant: NEC Laboratories America, Inc.
Inventor: Xiang Yu , Xi Yin , Kihyuk Sohn , Manmohan Chandraker
Abstract: A computer-implemented method, system, and computer program product are provided for facial recognition. The method includes receiving, by a processor device, a plurality of images. The method also includes extracting, by the processor device with a feature extractor utilizing a convolutional neural network (CNN) with an enlarged intra-class variance of long-tail classes, feature vectors for each of the plurality of images. The method additionally includes generating, by the processor device with a feature generator, discriminative feature vectors for each of the feature vectors. The method further includes classifying, by the processor device utilizing a fully connected classifier, an identity from the discriminative feature vector. The method also includes control an operation of a processor-based machine to react in accordance with the identity.
-
公开(公告)号:US10853487B2
公开(公告)日:2020-12-01
申请号:US16039993
申请日:2018-07-19
Applicant: NEC Laboratories America, Inc. , NEC Corporation
Inventor: Junghwan Rhee , Zhenyu Wu , Lauri Korts-Parn , Kangkook Jee , Zhichun Li , Omid Setayeshfar
Abstract: Systems and methods are disclosed for securing an enterprise environment by detecting suspicious software. A global program lineage graph is constructed. Construction of the global program lineage graph includes creating a node for each version of a program having been installed on a set of user machines. Additionally, at least two nodes are linked with a directional edge. For each version of the program, a prevalence number of the set of user machines on which each version of the program had been installed is determined; and the prevalence number is recorded to the metadata associated with the respective node. Anomalous behavior is identified based on structures formed by the at least two nodes and associated directional edge in the global program lineage graph. An alarm is displayed on a graphical user interface for each suspicious software based on the identified anomalous behavior.
-
公开(公告)号:US10852414B2
公开(公告)日:2020-12-01
申请号:US16582314
申请日:2019-09-25
Applicant: NEC Laboratories America, Inc.
Inventor: Karthikeyan Sundaresan , Eugene Chai , Sampath Rangarajan
Abstract: An in-home inventory and location system is provided. At least one RF backscatter transmitter, hosted on a device, is configured to emit a RF signal on a frequency. A set of passive RF backscatter tags, each associated with a respective one of a plurality of products in a given area, is configured to reflect and frequency shift the RF signal to a different frequency. At least one RF backscatter receiver, hosted on another device, is configured to read the products on the different frequency by detecting a distributed ambient backscatter signal generated by a reflection and frequency shifting of the RF signal by the passive RF backscatter tag. At least one of the device hosting the at least one RF backscatter transmitter and the other device hosting the at least one RF backscatter receiver is configured to maintain an inventory and location of the products in the given area.
-
-
-
-
-
-
-
-
-