Object modeling with adversarial learning

    公开(公告)号:US11137761B2

    公开(公告)日:2021-10-05

    申请号:US15818495

    申请日:2017-11-20

    Abstract: Methods, computer-readable media, and devices are disclosed for improving an object model based upon measurements of physical properties of an object via an unmanned vehicle using adversarial examples. For example, a method may include a processing system capturing measurements of physical properties of an object via at least one unmanned vehicle, updating an object model for the object to include the measurements of the physical properties of the object, where the object model is associated with a feature space, and generating an example from the feature space, where the example comprises an adversarial example. The processing system may further apply the object model to the example to generate a prediction, capture additional measurements of the physical properties of the object via the at least one unmanned vehicle when the prediction fails to identify that the example is an adversarial example, and update the object model to include the additional measurements.

    Synchronization of environments during extended reality experiences

    公开(公告)号:US11062678B2

    公开(公告)日:2021-07-13

    申请号:US16234089

    申请日:2018-12-27

    Abstract: In one example, a method includes monitoring conditions in a real environment in which a user is present, wherein the monitoring is performed by collecting data about the conditions from a plurality of sensors located in the real environment, transmitting the data about the conditions to an extended reality device that is present in the real environment, where the extended reality device is configured to render a virtual environment, interpolating between the real environment and the virtual environment, based at least in part on the conditions, to determine an actual extended reality environment that is being presented to the user, and sending a signal to a device that is located in the real environment, based on the interpolating, wherein the signal instructs the device to take an action that modifies at least one of the conditions in the real environment.

    Identifying and addressing offensive actions in visual communication sessions

    公开(公告)号:US10922534B2

    公开(公告)日:2021-02-16

    申请号:US16171944

    申请日:2018-10-26

    Abstract: A processing system having at least one processor may establish a communication session between a first communication system of a first user and a second communication system of a second user, the communication session including first visual content, the first visual content including a first visual representation of the first user, and detecting a first action of the first visual representation in the first visual content in accordance with a first action detection model. The processing system may modify, in response to the detecting the first action, the first visual content in accordance with a first configuration setting of the first user for the communication session, which may include modifying the first action of the first visual representation of the first user in the first visual content. In addition, the processing system may transmit the first visual content that is modified to the second communication system of the second user.

    Guided network management
    24.
    发明授权

    公开(公告)号:US10797960B2

    公开(公告)日:2020-10-06

    申请号:US15852017

    申请日:2017-12-22

    Abstract: The concepts and technologies disclosed herein are directed, in part, to a system that can monitor traffic traversing a virtualized network that includes a plurality of virtual network functions (“VNFs”) that provide, at least in part, a service. The system can capture an event from the traffic. The event can involve at least one VNF, and can negatively affect at least one operational aspect of the virtualized network in providing the service. The system can create snapshot that represents a network state of the virtualized network during the event. The system can create, based upon the snapshot, a shadow network. The shadow network can include a network emulation of the network state of the virtualized network during the event. The system can determine, from the shadow network, at least one modification to at least a portion of the virtualized network that would at least mitigate negative effects of the event.

    System for Delivery of XR Ad Programs
    25.
    发明申请

    公开(公告)号:US20200051132A1

    公开(公告)日:2020-02-13

    申请号:US16100503

    申请日:2018-08-10

    Abstract: Aspects of the subject disclosure may include, for example, a method including obtaining an advertisement package, wherein the advertisement package defines an interactive extended reality advertisement and includes a plurality of optional features; obtaining information about a user, their equipment, and their environment; creating an interactive extended reality advertisement by choosing a selected feature of the plurality of optional features according to the user information; and presenting the interactive extended reality advertisement to the user equipment. Other embodiments are disclosed.

    OBJECT MODELING WITH ADVERSARIAL LEARNING
    26.
    发明申请

    公开(公告)号:US20190155284A1

    公开(公告)日:2019-05-23

    申请号:US15818495

    申请日:2017-11-20

    Abstract: Methods, computer-readable media, and devices are disclosed for improving an object model based upon measurements of physical properties of an object via an unmanned vehicle using adversarial examples. For example, a method may include a processing system capturing measurements of physical properties of an object via at least one unmanned vehicle, updating an object model for the object to include the measurements of the physical properties of the object, where the object model is associated with a feature space, and generating an example from the feature space, where the example comprises an adversarial example. The processing system may further apply the object model to the example to generate a prediction, capture additional measurements of the physical properties of the object via the at least one unmanned vehicle when the prediction fails to identify that the example is an adversarial example, and update the object model to include the additional measurements.

    Machine Learning Model Understanding As-A-Service

    公开(公告)号:US20240311700A1

    公开(公告)日:2024-09-19

    申请号:US18675062

    申请日:2024-05-27

    CPC classification number: G06N20/00

    Abstract: Concepts and technologies disclosed herein are directed to machine learning model understanding as-a-service. According to one aspect of the concepts and technologies disclosed herein, a model understanding as-a-service system can receive, from a user system, a service request that includes a machine learning model created for a user associated with the user system. The model understanding as-a-service system can conduct an analysis of the machine learning model in accordance with the service request. The model understanding as-a-service system can compile, for the user, results of the analysis of the machine learning model in accordance with the service request. The model understanding as-a-service system can create a service response that includes the results of the analysis. The model understanding as-a-service system can provide the service response to the user system.

    Proximity based data access restrictions

    公开(公告)号:US11165771B2

    公开(公告)日:2021-11-02

    申请号:US15818343

    申请日:2017-11-20

    Abstract: An example method may include a processing system including at least one processor detecting an interaction of a first user and a second user, providing a temporary authorization to the second user to access a data set based upon an authorization of the first user to access the data set, wherein the providing the temporary authorization is in response to the detecting the interaction, generating a record of an access of the second user to the data set, wherein the record includes a notation of the temporary authorization of the second user to access the data set based upon the authorization of the first user, detecting an end to the interaction of the first user and the second user, and revoking the temporary authorization of the second user to access the data set in response to the detecting of the end of the interaction.

Patent Agency Ranking