Abstract:
Aspects of the subject disclosure may include, for example, system and apparatus that enable operations that may include receiving, by a processing system, project data defining a proposed machine learning (ML) project of an entity and storing the project data in a project database with other project data for other projects. The operations may further include extracting extracted features of the proposed project and, based on the extracted features, determining a clustering assignment for the proposed project. Determining the clustering assignment may comprise comparing information about the proposed project including the extracted features with information about the other projects and assigning the proposed project to a cluster including one or more projects having similar bias characteristics as the proposed project. The operations may further include determining a risk of potential bias for the proposed project and, based on the risk of bias, recommending a corrective action to reduce the risk of bias. Machine learning models may be used for project clustering and bias score determination and may be readily updated as new ML projects are evaluated. Other embodiments are disclosed.
Abstract:
A processing system including at least one processor may obtain a time series of measurement values from a communication network and train a prediction model in accordance with the time series of measurement values to predict future instances of an event of interest, where the time series of measurement values is labeled with one or more indicators of instances of the event of interest. The processing system may then generate a deterministic finite automaton based upon the prediction model, convert the deterministic finite automaton into a rule set, and deploy the rule set to at least one network component of the communication network.
Abstract:
A method includes constructing an information graph based on a set of training data provided to a machine learning algorithm, identifying an area of the information graph in which to increase an inclusion of the information graph, wherein the inclusion comprises a consideration of a population that is underrepresented in the information graph, collecting, from an auxiliary data source, auxiliary data about the population for use in increasing the inclusion of the information graph, utilizing the auxiliary data to increase the inclusion of the information graph, to generate an updated information graph, using the updated information graph to generate a test output that incorporates information from the auxiliary data, generating, when the test output satisfies an inclusion criterion, a runtime output using the updated information graph, receiving user feedback regarding the runtime output, and determining, in response to the user feedback, whether to further increase inclusion of the runtime output.
Abstract:
A processing system including at least one processor may obtain a time series of measurement values from a communication network and train a prediction model in accordance with the time series of measurement values to predict future instances of an event of interest, where the time series of measurement values is labeled with one or more indicators of instances of the event of interest. The processing system may then generate a deterministic finite automaton based upon the prediction model, convert the deterministic finite automaton into a rule set, and deploy the rule set to at least one network component of the communication network.
Abstract:
In one embodiment, a method includes determining, by one or more processors, a weight of a link between a first node and a second node of a network, wherein the weight is proportional to a probability value of forwarding a probe packet from the first node to the second node of the network. The method also includes adjusting, by the processors, the weight of the link between the first node and the second node using binary exponential backoff. The method further includes determining, by the processors, to forward the probe packet to the second node of the network based on the adjusted weight of the link and one or more field values of the probe packet.
Abstract:
A method and apparatus for enabling peer networks to reduce the exchange of unwanted traffic are disclosed. For example, the method receives at least one of: a source Internet Protocol (IP) address or a source IP address prefix that has been identified as a source of the unwanted traffic, by an originating peer network from a terminating peer network. The method then blocks the unwanted traffic destined to the terminating peer network by the originating peer network.
Abstract:
Methods, systems, and products protect personally identifiable information. Many websites acquire the personally identifiable information without a user's knowledge or permission. Here, though, the user may control what personally identifiable information is shared with any website. For example, the personally identifiable information may be read from a header of a packet and compared to a requirement associated with a domain name.
Abstract:
According to an aspect of this invention, a method to detect phishing URLs involves: creating a whitelist of URLs using a first regular expression; creating a blacklist of URLs using a second regular expression; comparing a URL to the whitelist; and if the URL is not on the whitelist, comparing the URL to the blacklist. False negatives and positives may be avoided by classifying Internet domain names for the target organization as “legitimate”. This classification leaves a filtered set of URLs with unknown domain names which may be more closely examined to detect a potential phishing URL. Valid domain names may be classified without end-user participation.