INTERPRETING CROSS-LINGUAL MODELS FOR NATURAL LANGUAGE INFERENCE

    公开(公告)号:US20220237391A1

    公开(公告)日:2022-07-28

    申请号:US17582464

    申请日:2022-01-24

    Abstract: Systems and methods are provided for Cross-lingual Transfer Interpretation (CTI). The method includes receiving text corpus data including premise-hypothesis pairs with a relationship label in a source language, and conducting a source to target language translation. The method further includes performing a feature importance extraction, where an integrated gradient is applied to assign an importance score to each input feature, and performing a cross-lingual feature alignment, where tokens in the source language are aligned with tokens in the target language for both the premise and the hypothesis based on semantic similarity. The method further includes performing a qualitative analysis, where the importance score of each token can be compared between the source language and the target language according to a feature alignment result.

    Anomalous account detection from transaction data

    公开(公告)号:US11169865B2

    公开(公告)日:2021-11-09

    申请号:US16562755

    申请日:2019-09-06

    Abstract: Systems and methods for implementing heterogeneous feature integration for device behavior analysis (HFIDBA) are provided. The method includes representing each of multiple devices as a sequence of vectors for communications and as a separate vector for a device profile. The method also includes extracting static features, temporal features, and deep embedded features from the sequence of vectors to represent behavior of each device. The method further includes determining, by a processor device, a status of a device based on vector representations of each of the multiple devices.

    INTERPRETING CONVOLUTIONAL SEQUENCE MODEL BY LEARNING LOCAL AND RESOLUTION-CONTROLLABLE PROTOTYPES

    公开(公告)号:US20210248462A1

    公开(公告)日:2021-08-12

    申请号:US17158466

    申请日:2021-01-26

    Abstract: A method interprets a convolutional sequence model. The method converts an input data sequence having input segments into output features. The method clusters the input segments into clusters using respective resolution-controllable class prototypes allocated to each of classes. Each respective class prototype includes a respective output feature subset characterizing a respective associated class. The method calculates, using the clusters, similarity scores that indicate a similarity of an output feature to a respective class prototypes responsive to distances between the output feature and the respective class prototypes. The method concatenates the similarity scores to obtain a similarity vector. The method performs a prediction and prediction support operation that provides a value of prediction and an interpretation for the value responsive to the input segments and similarity vector. The interpretation for the value of prediction is provided using only non-negative weights and lacking a weight bias in the fully connected layer.

    REINFORCED TEXT REPRESENTATION LEARNING

    公开(公告)号:US20210248425A1

    公开(公告)日:2021-08-12

    申请号:US17155452

    申请日:2021-01-22

    Abstract: A method for implementing graph-based reinforced text representation learning (GRTR) is presented. The method includes, in a training phase, generating a dependency tree for training text data, training a GRTR agent by learning to navigate in the dependency tree and selectively collecting semantic information, learning GRTR agents, and storing, in a GRTR-specific memory, parameters of the learned GRTR agents. The method further includes, in a testing phase, generating a dependency tree for testing the text data, retrieving and evaluating the learned GRTR agents of the training phase to evaluate testing samples, making task-specific decisions for the testing samples, and reporting the task-specific decisions to a computing device operated by a user.

    Density estimation network for unsupervised anomaly detection

    公开(公告)号:US10999247B2

    公开(公告)日:2021-05-04

    申请号:US16169012

    申请日:2018-10-24

    Abstract: Systems and methods for preventing cyberattacks using a Density Estimation Network (DEN) for unsupervised anomaly detection, including constructing the DEN using acquired network traffic data by performing end-to-end training. The training includes generating low-dimensional vector representations of the network traffic data by performing dimensionality reduction of the network traffic data, predicting mixture membership distribution parameters for each of the low-dimensional representations by performing density estimation using a Gaussian Mixture Model (GMM) framework, and formulating an objective function to estimate an energy and determine a density level of the low-dimensional representations for anomaly detection, with an anomaly being identified when the energy exceeds a pre-defined threshold. Cyberattacks are prevented by blocking transmission of network flows with identified anomalies by directly filtering out the flows using a network traffic monitor.

    DYNAMIC TRANSACTION GRAPH ANALYSIS
    19.
    发明申请

    公开(公告)号:US20200092316A1

    公开(公告)日:2020-03-19

    申请号:US16565746

    申请日:2019-09-10

    Abstract: Systems and methods for implementing dynamic graph analysis (DGA) to detect anomalous network traffic are provided. The method includes processing communications and profile data associated with multiple devices to determine dynamic graphs. The method includes generating features to model temporal behaviors of network traffic generated by the multiple devices based on the dynamic graphs. The method also includes formulating a list of prediction results for sources of the anomalous network traffic from the multiple devices based on the temporal behaviors.

    NEURAL NETWORK BASED SPOOFING DETECTION
    20.
    发明申请

    公开(公告)号:US20190098048A1

    公开(公告)日:2019-03-28

    申请号:US16101794

    申请日:2018-08-13

    Abstract: Methods and systems for mitigating a spoofing-based attack include calculating a travel distance between a source Internet Protocol (IP) address and a target IP address from a received packet based on time-to-live information from the received packet. An expected travel distance between the source IP address and the target IP address is estimated based on a sparse set of known source/target distances. It is determined that the received packet has a spoofed source IP address based on a comparison between the calculated travel distance and the expected travel distance. A security action is performed responsive to the determination that the received packet has a spoofed source IP address.

Patent Agency Ranking