-
公开(公告)号:US10405209B2
公开(公告)日:2019-09-03
申请号:US15915436
申请日:2018-03-08
Applicant: NEC Laboratories America, Inc.
Inventor: Karthikeyan Sundaresan , Eugene Chai , Mohammad Khojastepour , Sampath Rangarajan
Abstract: A system, method, and computer program product are provided for blue-printing interference for mobile access in an unlicensed spectrum of a synchronous scheduled cellular access system. The system includes a cellular base station having a processor. The processor constructs and executes an intelligent measurement schedule of clients for uplink transmissions to obtain access measurements for the uplink transmissions. The intelligent measurement schedule is constructed for scalable access measurement overhead. The access measurements indicate interference dependencies between the clients. The processor estimates an interference topology and statistics of the interference topology, from the access measurements to form an interference blueprint. The processor adjusts the intelligent measurement schedule to overschedule the clients for the uplink transmissions to reduce spectrum utilization loss while minimizing client transmission collisions, based on the interference blueprint. The processor initiates the uplink transmissions for the clients in accordance with the adjusted intelligent measurement schedule.
-
公开(公告)号:US10402983B2
公开(公告)日:2019-09-03
申请号:US15695625
申请日:2017-09-05
Applicant: NEC Laboratories America, Inc.
Inventor: Samuel Schulter , Wongun Choi , Paul Vernaza , Manmohan Chandraker
Abstract: A surveillance system and method are provided. The surveillance system includes at least one camera configured to capture a set of images of a given target area that includes a set of objects to be tracked. The surveillance system includes a memory storing a learning model configured to perform multi-object tracking by jointly learning arbitrarily parameterized and differentiable cost functions for all variables in a linear program that associates object detections with bounding boxes to form trajectories. The surveillance system includes a processor configured to perform surveillance of the target area to (i) detect the objects and track locations of the objects by applying the learning model to the images in a surveillance task that uses the multi-object tracking, and (ii), provide a listing of the objects and their locations for surveillance task. A bi-level optimization is used to minimize a loss defined on a solution of the linear program.
-
公开(公告)号:US10402701B2
公开(公告)日:2019-09-03
申请号:US15889913
申请日:2018-02-06
Applicant: NEC Laboratories America, Inc.
Inventor: Kihyuk Sohn , Xiang Yu , Manmohan Chandraker
IPC: G06K9/00 , G06K9/66 , G06N3/08 , G06N20/00 , G06K9/62 , G06T7/70 , G06T9/00 , G06K9/46 , G06N3/02 , G08B13/196 , G06N3/04
Abstract: A face recognition system is provided that includes a device configured to capture a video sequence formed from a set of unlabeled testing video frames. The system includes a processor configured to pre-train a face recognition engine formed from reference CNNs on a still image domain that includes labeled training still image frames of faces. The processor adapts the face recognition engine to a video domain to form an adapted engine, by applying non-reference CNNs to domains including the still image and video domains and a degraded image domain. The degraded image domain includes labeled synthetically degraded versions of the frames included in the still image domain. The video domain includes random unlabeled training video frames. The processor recognizes, using the adapted engine, identities of persons corresponding to at least one face in the video sequence to obtain a set of identities. A display device displays the set of identities.
-
654.
公开(公告)号:US10402653B2
公开(公告)日:2019-09-03
申请号:US15380014
申请日:2016-12-15
Applicant: NEC Laboratories America, Inc.
Inventor: Renqiang Min , Dongjin Song , Eric Cosatto
Abstract: A computer-implemented method and system are provided for video-based anomaly detection. The method includes forming, by a processor, a Deep High-Order Convolutional Neural Network (DHOCNN)-based model having a one-class Support Vector Machine (SVM) as a loss layer of the DHOCNN-based model. An objective of the SVM is configured to perform the video-based anomaly detection. The method further includes generating, by the processor, one or more predictions of an impending anomaly based on the high-order deep learning based model applied to an input image. The method also includes initiating, by the processor, an action to a hardware device to mitigate expected harm to at least one item selected from the group consisting of the hardware device, another hardware device related to the hardware device, and a person related to the hardware device.
-
公开(公告)号:US10402564B2
公开(公告)日:2019-09-03
申请号:US15623589
申请日:2017-06-15
Applicant: NEC Laboratories America, Inc.
Inventor: Junghwan Rhee , Yuseok Jeon , Zhichun Li , Kangkook Jee , Zhenyu Wu , Guofei Jiang
Abstract: A computer-implemented method for analyzing operations of privilege changes is presented. The computer-implemented method includes inputting a program and performing source code analysis on the program by generating a privilege control flow graph (PCFG), generating a privilege data flow graph (PDFG), and generating a privilege call context graph (PCCG). The computer-implemented method further includes, based on the source code analysis results, instrumenting the program to perform inspections on execution states at privilege change operations, and performing runtime inspection and anomaly prevention.
-
公开(公告)号:US10402289B2
公开(公告)日:2019-09-03
申请号:US15661625
申请日:2017-07-27
Applicant: NEC Laboratories America, Inc.
Inventor: Wei Cheng , Haifeng Chen , Guofei Jiang , Jingchao Ni
Abstract: A computer-implemented method for diagnosing system faults by fine-grained causal anomaly inference is presented. The computer-implemented method includes identifying functional modules impacted by causal anomalies and backtracking causal anomalies in impaired functional modules by a low-rank network diffusion model. An invariant network and a broken network are inputted into the system, the invariant network and the broken network being jointly clustered to learn a degree of broken severities of different clusters as a result of fault propagations.
-
公开(公告)号:US20190260778A1
公开(公告)日:2019-08-22
申请号:US16246774
申请日:2019-01-14
Applicant: NEC Laboratories America, Inc.
Inventor: Haifeng Chen , Bo Zong , Christian Lumezanu
Abstract: A method for detecting spoofing attacks from network traffic log data is presented. The method includes training a spoofing attack detector with the network traffic log data received from one or more mobile networks by extracting features that are relevant to spoofing attacks for training data, building a first set of vector representations for the network traffic log data, training an anomaly detection model by employing DAGMM, and obtaining learned parameters of DAGMM. The method includes testing the spoofing attack detector with the network traffic log data received from the one or more mobile networks by extracting features that are relevant to spoofing attacks for testing data, building a second set of vector representations for the network traffic log data, obtaining latent representations of the testing data, computing a z-score of the testing data, and creating a spoofing attack alert report listing traffic logs generating z-scores exceeding a predetermined threshold.
-
658.
公开(公告)号:US10382138B2
公开(公告)日:2019-08-13
申请号:US15912852
申请日:2018-03-06
Applicant: NEC Laboratories America, Inc.
Inventor: Shaoliang Zhang , Fatih Yaman , Eduardo Mateo Rodriguez , Yoshihisa Inada
IPC: H04L1/00 , H03M13/11 , H03M13/25 , H04B10/27 , H04B10/58 , H04L27/34 , H04L27/36 , H04B10/2543 , H04B10/54 , H04B10/516
Abstract: Aspects of the present disclosure describe methods of generating an optimized set of constellation symbols for an optical transmission network wherein the optimized constellation is based on GMI cost and considers both fiber nonlinearity and linear transmission noise.
-
公开(公告)号:US20190236920A1
公开(公告)日:2019-08-01
申请号:US16229574
申请日:2018-12-21
Applicant: NEC Laboratories America, Inc.
Inventor: Ming-Fang Huang , Ting Wang
CPC classification number: G08B13/22 , G01V1/001 , G01V1/226 , G06N5/04 , G06N20/00 , G08B19/00 , G08B25/08 , H04B10/27 , H04B10/85
Abstract: A security system is provided for a building. The security system includes a fiber optic cable arranged in various locations in the building for Distributed Vibration Sensing (DVS) and Distributed Acoustic Sensing (DAS) at the various locations. The security system further includes a machine-learning-based analyzer for selectively providing any of an early warning and a prevention of various detected conditions responsive to a machine-learning-based analysis of results from the DVS and the DAS.
-
公开(公告)号:US10366292B2
公开(公告)日:2019-07-30
申请号:US15794758
申请日:2017-10-26
Applicant: NEC Laboratories America, Inc.
Inventor: Renqiang Min , Yunchen Pu
IPC: G06K9/00 , G06K9/46 , G06N3/04 , G06K9/66 , H04N5/278 , G06K9/62 , H04N21/218 , H04N21/234 , H04N21/488 , G06K9/72 , H04N7/18
Abstract: A system is provided for video captioning. The system includes a processor. The processor is configured to apply a three-dimensional Convolutional Neural Network (C3D) to image frames of a video sequence to obtain, for the video sequence, (i) intermediate feature representations across L convolutional layers and (ii) top-layer features. The processor is further configured to produce a first word of an output caption for the video sequence by applying the top-layer features to a Long Short Term Memory (LSTM). The processor is further configured to produce subsequent words of the output caption by (i) dynamically performing spatiotemporal attention and layer attention using the intermediate feature representations to form a context vector, and (ii) applying the LSTM to the context vector, a previous word of the output caption, and a hidden state of the LSTM. The system further includes a display device for displaying the output caption to a user.
-
-
-
-
-
-
-
-
-