-
公开(公告)号:US20240291633A1
公开(公告)日:2024-08-29
申请号:US18113219
申请日:2023-02-23
Applicant: International Business Machines Corporation
Inventor: Giulio Zizzo , Stefano Braghin , Ambrish Rawat , Mark Purcell
Abstract: A computer-implemented method, system and computer program product for verifying the trustworthiness of an aggregation scheme utilized by an aggregator in the federated learning technique. A bit mask is received from each client used for training a machine learning algorithm using the federated learning technique. Such a bit mask contains values of ones and zeros, where a value of one indicates that the updated parameter of the global model corresponds to a parameter used by the local model trained on the client and a value of zero indicates that is not the case. These bit masks, which are encrypted, may then be combined using a homomorphic additive encryption scheme into a mask containing a matrix of values. If the mask contains a matrix of values of only the value of one, then the aggregator is deemed to be trustworthy. Otherwise, the aggregator is deemed to be untrustworthy.
-
2.
公开(公告)号:US20240249153A1
公开(公告)日:2024-07-25
申请号:US18166027
申请日:2023-02-08
Applicant: International Business Machines Corporation
Inventor: Swanand Ravindra Kadhe , Heiko H. Ludwig , Nathalie Baracaldo Angel , Yi Zhou , Alan Jonathan King , Keith Coleman Houck , Ambrish Rawat , Mark Purcell , Naoise Holohan , Mikio Takeuchi , Ryo Kawahara , Nir Drucker , Hayim Shaul
Abstract: Systems, devices, computer program products and/or computer-implemented methods of use provided herein relate to federated training and inferencing. A system can comprise a memory that stores computer executable components, and a processor that executes the computer executable components stored in the memory, wherein the computer executable components can comprise a modeling component that trains an inferential model using data from a plurality of parties and comprising horizontally partitioned data and vertically partitioned data, wherein the modeling component employs a random decision tree comprising the data to train the inferential model, and an inference component that responds to a query, employing the inferential model, by generating an inference, wherein first party private data, of the data, originating from a first passive party of the plurality of parties, is not directly shared with other passive parties of the plurality of parties to generate the inference.
-
公开(公告)号:US20240249018A1
公开(公告)日:2024-07-25
申请号:US18158299
申请日:2023-01-23
Applicant: International Business Machines Corporation
Inventor: Ambrish Rawat , Naoise Holohan , Heiko H. Ludwig , Ehsan Degan , Nathalie Baracaldo Angel , Alan Jonathan King , Swanand Ravindra Kadhe , Yi Zhou , Keith Coleman Houck , Mark Purcell , Giulio Zizzo , Nir Drucker , Hayim Shaul , Eyal Kushnir , Lam Minh Nguyen
IPC: G06F21/62
CPC classification number: G06F21/6245 , G06F21/6227
Abstract: One or more systems, devices, computer program products and/or computer-implemented methods of use provided herein relate to a process for privacy-enhanced machine learning and inference. A system can comprise a memory that stores computer executable components, and a processor that executes the computer executable components stored in the memory, wherein the computer executable components can comprise a processing component that generates an access rule that modifies access to first data of a graph database, wherein the first data comprises first party information identified as private, a sampling component that executes a random walk for sampling a first graph of the graph database while employing the access rule, wherein the first graph comprises the first data, and an inference component that, based on the sampling, generates a prediction in response to a query, wherein the inference component avoids directly exposing the first party information in the prediction.
-
公开(公告)号:US20220404819A1
公开(公告)日:2022-12-22
申请号:US17352959
申请日:2021-06-21
Applicant: International Business Machines Corporation
Inventor: Amadou Ba , Ambrish Rawat , Joern Ploennigs
IPC: G05B19/418 , B29C64/393 , G05B19/4099
Abstract: A method for additive manufacturing includes identifying a discrepancy between a three-dimensional model and an object model. The three-dimensional model is a model of a three-dimensional object that is being constructed by an additive manufacturing process, and the three-dimensional object is being constructed based on the object model. The method further includes determining a reconfiguration recommendation based on the identified discrepancy. The method further includes reconfiguring the additive manufacturing process based on the reconfiguration recommendation.
-
公开(公告)号:US20240193428A1
公开(公告)日:2024-06-13
申请号:US18063813
申请日:2022-12-09
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Ambrish Rawat , Killian Levacher , Giulio Zizzo , Ngoc Minh Tran
Abstract: A method, computer system, and computer program product are provided for training a federated generative adversarial network (GAN) using private data. The method is carried out at an aggregator system having a generator and a discriminator, wherein the aggregator system is in communication with multiple participant systems each having a local feature extractor and a local discriminator. The method includes: receiving, from a feature extractor at a participant system, a set of features for input to the discriminator at the aggregator system, wherein the features include features extracted from private data that is private to the participant system; and receiving, from one or more local discriminators of the participant systems, discriminator parameter updates to update the discriminator at the aggregator system, wherein the local discriminators are trained at the participant systems.
-
公开(公告)号:US11568249B2
公开(公告)日:2023-01-31
申请号:US16842113
申请日:2020-04-07
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Ambrish Rawat , Martin Wistuba , Beat Buesser , Mathieu Sinn , Sharon Qian , Suwen Lin
Abstract: Various embodiments are provided for automating decision making for a neural architecture search by one or more processors in a computing system. One or more specifications may be automatically selected for a dataset, tasks, and one or more constraints for a neural architecture search. The neural architecture search may be performed based on the one or more specifications. A deep learning model may be suggested, predicted, and/or configured for the dataset, the tasks, and the one or more constraints based on the neural architecture search.
-
公开(公告)号:US20220198278A1
公开(公告)日:2022-06-23
申请号:US17133472
申请日:2020-12-23
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Fearghal O'Donncha , Ambrish Rawat , Sean A. McKenna , Mathieu Sinn
Abstract: A computing device configured for automatic selection of model parameters includes a processor and a memory coupled to the processor. The memory stores instructions to cause the processor to perform acts including providing an initial set of model parameters and initial condition information to a model based on historical data. A model generates data based on the model parameters and the initial condition information. After determining whether the model-generated data is similar to an observed data, updated model parameters are selected for input to the model based on the determined similarity.
-
公开(公告)号:US20220188690A1
公开(公告)日:2022-06-16
申请号:US17118648
申请日:2020-12-11
Applicant: International Business Machines Corporation
Inventor: Ambrish Rawat , Hessel Tuinhof , Killian Levacher , Stefano Braghin
Abstract: A computer-implemented method includes receiving at a threat detection system monitoring data in real-time from online activity in a network, the threat detection system including a machine learning model, and analyzing the monitoring data via the machine learning model to identify one or more anomalies in the monitoring data associated with a security threat to the network, the machine learning model trained to have one or more learning parameters. The method also includes receiving a subset of the monitoring data at a meta-learning module, storing the subset as time-based historical data, inputting the historical data at a meta-learning model, calculating an update policy prescribing a change to the one or more learning parameters based on the historical data, and applying the update policy to the machine learning model.
-
公开(公告)号:US11288408B2
公开(公告)日:2022-03-29
申请号:US16601459
申请日:2019-10-14
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Beat Buesser , Maria-Irina Nicolae , Ambrish Rawat , Mathieu Sinn , Ngoc Minh Tran , Martin Wistuba
IPC: G06F21/84
Abstract: Embodiments for providing adversarial protection to computing display devices by a processor. Security defenses may be provided on one or more image display devices against automated media analysis by using adversarial noise, an adversarial patch, or a combination thereof.
-
公开(公告)号:US20230289573A1
公开(公告)日:2023-09-14
申请号:US17654093
申请日:2022-03-09
Applicant: International Business Machines Corporation
Inventor: Ambrish Rawat , Jonathan Peter Epperlein , Rahul Nair , Killian Levacher
IPC: G06N3/04
CPC classification number: G06N3/0472
Abstract: A computer-implemented method, a computer program product, and a computer system for assessing fairness of a deep generative model. A computer system receives a user defined fairness criterion for the deep generative model. A computer system probes the deep generative model to produce samples for a target output. A computer system evaluates the samples for the fairness of the deep generative model, according to the user defined fairness criterion. A computer system produces a set of recommendations for modifying the deep generative model to meet the user defined fairness criterion, in response to determining that the deep generative model does not meet the user defined fairness criterion. In response to determining that the deep generative model is to be modified, a computer system applies at least one subset of the recommendations to the deep generative model. A computer system updates the deep generative model.
-
-
-
-
-
-
-
-
-