-
公开(公告)号:US11334709B2
公开(公告)日:2022-05-17
申请号:US16189991
申请日:2018-11-13
IPC分类号: H04L67/52 , G06F9/54 , G06F21/62 , G06F40/117 , G06F40/205 , G06N20/00 , G06N3/08
摘要: A computer-implemented method according to one embodiment includes identifying a topic associated with a received notification, determining a plurality of policies associated with the topic, determining a current environmental context, determining a generalization level, utilizing the plurality of policies and the current environmental context, modifying the notification, based on the generalization level, and presenting the modified notification.
-
公开(公告)号:US11057284B2
公开(公告)日:2021-07-06
申请号:US15615151
申请日:2017-06-06
发明人: Obinna B. Anya , Heiko H. Ludwig , Nagapramod S. Mandagere , Mohamed Mohamed , Mu Qiao , Ramani R. Routray , Samir Tata
摘要: One embodiment provides a quality of service (QoS) monitoring framework for dynamically binding one or more customer applications to one or more microservices in a dynamic service environment, collecting compliance data and contextual data from the dynamic service environment and one or more hosting environments, and modifying a monitoring infrastructure for the one or more customer applications based on the compliance data and the contextual data.
-
公开(公告)号:US20210081708A1
公开(公告)日:2021-03-18
申请号:US16571321
申请日:2019-09-16
摘要: Embodiments relate to a system, program product, and method for automatically determining which activation data points in a neural model have been poisoned to erroneously indicate association with a particular label or labels. A neural network is trained network using potentially poisoned training data. Each of the training data points is classified using the network to retain the activations of the last hidden layer, and segment those activations by the label of corresponding training data. Clustering is applied to the retained activations of each segment, and a cluster assessment is conducted for each cluster associated with each label to distinguish clusters with potentially poisoned activations from clusters populated with legitimate activations. The assessment includes analyzing, for each cluster, a distance of a median of the activations therein to medians of the activations in the labels.
-
公开(公告)号:US10657463B2
公开(公告)日:2020-05-19
申请号:US16455593
申请日:2019-06-27
发明人: Nathalie Baracaldo Angel , Pawan R. Chowdhary , Heiko H. Ludwig , Robert J. Moore , Taiga Nakamura
摘要: One embodiment provides a method comprising answering one or more incoming phone calls received at one or more pre-specified phone numbers utilizing a bot. The bot is configured to engage in a conversation with a caller initiating an incoming phone call utilizing a voice recording that impersonates a human being. The method further comprises recording each conversation the bot engages in, and classifying each recorded conversation as one of poison data or truthful training data based on content of the recorded conversation and one or more learned detection models for detecting poisoned data.
-
15.
公开(公告)号:US20200082123A1
公开(公告)日:2020-03-12
申请号:US16681048
申请日:2019-11-12
IPC分类号: G06F21/62 , G06F21/60 , G10L15/26 , G16H10/60 , G10L21/0208 , H04K1/06 , H04K1/04 , G10L21/0364 , G10L15/08 , G06F3/16 , G06Q30/02 , H04L29/06
摘要: A computer-implemented method includes identifying a plurality of protected pieces from a conversation. The computer-implemented method further includes generating one or more confidence scores for each protected piece, wherein a confidence score is a degree of associativity between a protected piece and a type of sensitive information. The computer-implemented method further includes determining that the protected piece is associated with the type of sensitive information. The computer-implemented method further includes determining a type of protection action for each protected piece in the plurality of protected pieces. The computer-implemented method further includes performing the type of protection action for each protected piece in the plurality of protected pieces to form a modified conversation that is devoid of the sensitive information. A corresponding computer system and computer program product are also disclosed.
-
公开(公告)号:US20200019821A1
公开(公告)日:2020-01-16
申请号:US16031953
申请日:2018-07-10
摘要: Computer-implemented methods, program products, and systems for provenance-based defense against poison attacks are disclosed. In one approach, a method includes: receiving observations and corresponding provenance data from data sources; determining whether the observations are poisoned based on the corresponding provenance data; and removing the poisoned observation(s) from a final training dataset used to train a final prediction model. Another implementation involves provenance-based defense against poison attacks in a fully untrusted data environment. Untrusted data points are grouped according to provenance signature, and the groups are used to train learning algorithms and generate complete and filtered prediction models. The results of applying the prediction models to an evaluation dataset are compared, and poisoned data points identified where the performance of the filtered prediction model exceeds the performance of the complete prediction model. Poisoned data points are removed from the set to generate a final prediction model.
-
公开(公告)号:US10241826B2
公开(公告)日:2019-03-26
申请号:US15792643
申请日:2017-10-24
摘要: In one embodiment, a computer program product includes a computer-readable storage medium having program instructions embodied therewith. The embodied program instructions are executable by a processor to cause the processor to receive, by the processor, a first job request. The embodied program instructions are also executable by the processor to cause the processor to analyze, by the processor, the first job request to determine a user skill level of a user that submitted the first job request. Moreover, the embodied program instructions are executable by the processor to cause the processor to admit, by the processor, the first job request to a data analytics system and/or a data storage system in a specified order with respect to other received job requests based on at least the user skill level of the user that submitted the first job request. Other systems and methods are described in accordance with more embodiments.
-
公开(公告)号:US20180336916A1
公开(公告)日:2018-11-22
申请号:US16051205
申请日:2018-07-31
发明人: Nathalie Baracaldo Angel , Pawan R. Chowdhary , Heiko H. Ludwig , Robert J. Moore , Taiga Nakamura
摘要: One embodiment provides a method comprising answering one or more incoming phone calls received at one or more pre-specified phone numbers utilizing a bot. The bot is configured to engage in a conversation with a caller initiating an incoming phone call utilizing a voice recording that impersonates a human being. The method further comprises recording each conversation the bot engages in, and classifying each recorded conversation as one of poison data or truthful training data based on content of the recorded conversation and one or more learned detection models for detecting poisoned data.
-
公开(公告)号:US20180305010A1
公开(公告)日:2018-10-25
申请号:US15497084
申请日:2017-04-25
CPC分类号: B64C39/024 , B64C2201/12 , F16M11/18 , F16M13/027 , G05D1/0011 , G05D1/0033 , G05D1/0676 , G08B3/10 , G08B5/36 , G08B5/38 , G08B17/10 , G08B25/10
摘要: One embodiment provides a method comprising receiving a request to release a utility holder detachably mounted to a surface mount. The utility holder maintains a utility payload. A set of rotatable holding brackets is coupled to the surface mount in a pivotable fashion to engage the holding brackets with the utility holder in order to mount the utility holder to the surface mount. The method further comprises, in response to receiving the request, powering on a drone attached to the utility holder, and releasing the utility holder from the surface mount by actuating rotation of the holding brackets to disengage the holding brackets from the utility holder, enabling the drone to transport the utility holder from the surface mount to a desired location.
-
公开(公告)号:US20170090975A1
公开(公告)日:2017-03-30
申请号:US14869798
申请日:2015-09-29
IPC分类号: G06F9/46
CPC分类号: G06F9/46 , G06F9/4843
摘要: In one embodiment, a computer program product includes a computer readable storage medium having program instructions embodied therewith. The embodied program instructions are executable by a processor to cause the processor to receive, by the processor, a first job request, and analyze, by the processor, the first job request to determine: an estimated complexity of the first job request based on one or more attributes of the first job request and a user skill level of a user that submitted the first job request. Moreover, the embodied program instructions are executable by the processor to admit, by the processor, the first job request to a data analytics system and/or a data storage system in a specified order with respect to other received job requests based on at least: the estimated complexity of the first job request, and the user skill level of the user that submitted the first job request.
-
-
-
-
-
-
-
-
-