Transformation as a service
    21.
    发明授权

    公开(公告)号:US12032520B2

    公开(公告)日:2024-07-09

    申请号:US18149787

    申请日:2023-01-04

    CPC classification number: G06F16/168 G06F16/256 G06F16/258

    Abstract: Aspects of the subject disclosure may include, for example, receiving input data via a transformation UI, generating transformation configuration data, causing the transformation UI to present transformation object data per the transformation configuration data, where the transformation object data identifies data objects each including an input and output field name and a data type, detecting, from the transformation UI, an instruction defining a mapping for the input data, including a modification to the output field name of a data object such that the input field name of the data object is mapped to the modified output field name, based on the detecting the instruction, modifying the first transformation configuration data per the mapping to derive second transformation configuration data, performing a transformation of the input data based on the second transformation configuration data, and causing the transformation UI to present a transformation output. Other embodiments are disclosed.

    MITIGATING TEMPORAL GENERALIZATION FOR A MACHINE LEARNING MODEL

    公开(公告)号:US20230401512A1

    公开(公告)日:2023-12-14

    申请号:US17839260

    申请日:2022-06-13

    CPC classification number: G06Q10/0637 G06N20/00 G06N5/025

    Abstract: Mitigation of temporal generalization losses a target machine learning model is disclosed. Mitigation can be based on identifying, removing, modifying, transforming, etc., features, explanatory variables, models, etc., that can have an unstable relationship with a target outcome over time. Implementation of a more stable representation can be initiated. Temporal stability measures (TSMs) for one or more model feature(s) can be determined based on one or more variable performance metrics (VPMs). A group of one or more VPMs can be selected based on features of a model in either a development or production environment. Model feature modification can be recommended based on a TSM, which can prune a feature, transform a feature, add a feature, etc. Temporal stability information can be presented, e.g., via a dashboard-type user interface. Models can be updated based on mutations of a model comprising a feature modification(s), including competitive champion/challenger model updating.

    CODE-TO-UTILIZATION METRIC BASED CODE ARCHITECTURE ADAPTATION

    公开(公告)号:US20230142895A1

    公开(公告)日:2023-05-11

    申请号:US17520144

    申请日:2021-11-05

    CPC classification number: G06F9/505 G06F11/3433 G06F11/0709

    Abstract: Determining a recommendation to convert a block of code into a serverless function based on analysis of code in execution in a cloud computing environment is disclosed. The block of code can be correlated to high levels of computing resource utilization that can inflate a cost of deploying a corresponding application in the cloud computing environment by prophylactically increasing an amount of provisioned computing resources to accommodate the high-utilization of the block of code. Converting the block of code into a serverless function can reduce the cost via offloading the functionality from the code into a function call supported by the cloud computing environment in an as-needed capacity, thereby reducing the amount of prophylactically provisioned computing resources. The recommendation can occur continuously in a production environment and cot-to-utilization information can render to facilitate identification of code block conversion targets.

    TELECOMMUNICATION NETWORK MACHINE LEARNING DATA SOURCE FAULT DETECTION AND MITIGATION

    公开(公告)号:US20220329328A1

    公开(公告)日:2022-10-13

    申请号:US17225784

    申请日:2021-04-08

    Abstract: A processing system may determine a plurality of input features of a first machine learning model that is deployed in a telecommunication network for a prediction task associated with an operation of the telecommunication network and apply a time series forecast model to a historical data set of a first data source associated with at least one of the plurality of input features to generate a forecast upper bound of a first characteristic of the first data source for a first time period and a forecast lower bound of the first characteristic of the first data source for the first time period. The processing system may then detect that the first characteristic exceeds one of the forecast upper bound or the forecast lower bound during the first time period and generate an alert that an output of the first machine learning model may be faulty, in response to the detecting.

    Relationship graphs for telecommunication network fraud detection

    公开(公告)号:US12192400B2

    公开(公告)日:2025-01-07

    申请号:US17566905

    申请日:2021-12-31

    Abstract: A processing system may maintain a relationship graph that includes nodes and edges representing phone numbers and device identifiers having associations with the phone numbers. The processing system may obtain an identification of a first phone number or a first device identifier for a fraud evaluation and extract features from the relationship graph associated with at least one of the first phone number or the first device identifier. The plurality of features may include one or more device identifiers associated with the first phone number, or one or more phone numbers associated with the first device identifier. The processing system may then apply the features to a prediction model that is implemented by the processing system and that is configured to output a fraud risk value of the first phone number or the first device identifier and implement at least one remedial action in response to the fraud risk value.

    MACHINE LEARNING MODEL FEATURE SHARING FOR SUBSCRIBER IDENTITY MODULE HIJACK PREVENTION

    公开(公告)号:US20240171558A1

    公开(公告)日:2024-05-23

    申请号:US17989284

    申请日:2022-11-17

    CPC classification number: H04L63/08 G06F21/316 H04L2463/082

    Abstract: A processing system including at least one processor may obtain a first input data set associated with a telephone number from a first service provider that implements a multi-factor authentication process for permitting an access to a service of the first service provider and may apply at least the first input data set to a machine learning model implemented by the processing system to obtain a risk score associated with the telephone number for a subscriber identity module swap of a subscriber identity module, where the machine learning model is trained to generate the risk score associated with the telephone number in accordance with at least the first input data set. The processing system may then perform at least one remedial action associated with the telephone number and the subscriber identity module, in response to the risk score.

    Data stream based event sequence anomaly detection for mobility customer fraud analysis

    公开(公告)号:US11979521B2

    公开(公告)日:2024-05-07

    申请号:US17321279

    申请日:2021-05-14

    CPC classification number: H04M7/0078 H04L51/21 H04M3/22 G06Q20/4016

    Abstract: Data stream based event sequence anomaly detection for mobility customer fraud analysis is presented herein. A system obtains a sequence of events comprising respective modalities of communication that correspond to a subscriber identity associated with a communication service—the sequence of events having occurred within a defined period. Based on defined classifiers representing respective fraudulent sequences of events, the system determines, via a group of machine learning models corresponding to respective machine learning processes, whether the sequence of events satisfies a defined condition with respect to likelihood of representing a fraudulent sequence of events of the respective fraudulent sequences of events. In response to the sequence of events being determined to satisfy the defined condition, the system sends, via a user interface of the system, a notification indicating that the sequence of events has been determined to represent the fraudulent sequence of events.

Patent Agency Ranking