-
1.
公开(公告)号:WO2023009810A2
公开(公告)日:2023-02-02
申请号:PCT/US2022/038857
申请日:2022-07-29
Applicant: VISA INTERNATIONAL SERVICE ASSOCIATION
Inventor: EBRAHIMI, Javid , ZHANG, Wei , YANG, Hao
IPC: G06N20/20 , G06F40/126 , G06F40/20 , G06N3/0442 , G06N3/047 , G06N3/094 , G06N3/096 , G06N3/0985
Abstract: Methods for adversarial training and/or for analyzing the impact of fine- tuning on deep learning models may include receiving a deep learning model comprising a set of parameters and a dataset of samples. A respective noise vector for a respective sample may be generated based on a length of the sample and a radius hyperparameter. For a target number of steps, the following may be repeated: adjusting the noise vector based on a step size hyperparameter, and projecting the respective noise vector to be within a boundary. The parameters of the deep learning model may be adjusted based on a gradient of a loss based on the noise vector. This may be repeated for each sample of the plurality of samples. A system and computer program product are also disclosed.
-
公开(公告)号:WO2022076234A1
公开(公告)日:2022-04-14
申请号:PCT/US2021/052798
申请日:2021-09-30
Applicant: VISA INTERNATIONAL SERVICE ASSOCIATION
Inventor: WU, Yuhang , ARORA, Sunpreet Singh , YANG, Hao , ABUSNAINA, Ahmed
Abstract: Techniques are disclosed for performing adversarial object detection. In one example, a system obtains a feature vector upon receiving an object to be classified. The system then generates a graph using the feature vector for the object and other feature vectors that are respectively obtained from a reference set of objects, whereby the feature vector corresponds to a center node of the graph. The system uses a distance metric to select neighbor nodes from among the reference set of objects for inclusion into the graph, and then determines edge weights between nodes of the graph based on a distance between respective feature vectors between nodes. The system then applies a graph discriminator to the graph to classify the object as adversarial or benign, the graph discriminator being trained using (I) the feature vectors associated with nodes of the graph and (II) the edge weights between the nodes of the graph.
-
3.
公开(公告)号:WO2021096694A1
公开(公告)日:2021-05-20
申请号:PCT/US2020/057959
申请日:2020-10-29
Applicant: VISA INTERNATIONAL SERVICE ASSOCIATION
Inventor: WU, Yuhang , ARORA, Sunpreet , YANG, Hao
Abstract: A computer-implemented method for improving security of a biometrics-based authentication system comprises receiving, by one or more servers, enrolled biometric samples of an enrolled user during an enrollment stage of the biometrics-based authentication system. Augmented biometric samples are created by adding learned perturbations to the enrolled biometric samples of the enrolled user. During a request for authentication, submitted biometric samples are received from a second user purporting to be the enrolled user. The submitted biometric samples of the second user are compared to the enrolled biometric samples and to the augmented biometric samples of the enrolled user based on predefined metrics. Based on the comparison it is determined whether the submitted biometric samples of the second user have been modified to impersonate the enrolled user.
-
公开(公告)号:WO2020112104A1
公开(公告)日:2020-06-04
申请号:PCT/US2018/062847
申请日:2018-11-28
Applicant: VISA INTERNATIONAL SERVICE ASSOCIATION
Inventor: SINHA, Rohit , GADDAM, Sivanarayana , LUYKX, Atul , YANG, Hao
Abstract: Described herein are a system and techniques for enabling user control over usage of their information, even when untrusted parties are involved. In embodiments of the disclosure, users are able to modify policy data on a decentralized network. A users information may be collected by a client device and provided to a host server. An encrypted version of the users information may be stored at the host server and when requested by a data consumer, the request may be processed on a private enclave of the host server. This may involve determining, based on a current status of the policy data on the decentralized network, whether the request is an authorized request. If so, then the information is decrypted, processed, and re-encrypted using a different cryptographic key. The requestor of the data may then be given access to the encrypted output.
-
公开(公告)号:WO2022108767A1
公开(公告)日:2022-05-27
申请号:PCT/US2021/058151
申请日:2021-11-05
Applicant: VISA INTERNATIONAL SERVICE ASSOCIATION
Inventor: GELDA, Dhruv , JAIN, Shubham , MCGLOIN, Andrew, Malachy , ZHANG, Wei , YANG, Hao , WANG, Liang
Abstract: A method of determining fraud includes: receiving a transaction request associated with a first payment transaction between a merchant and a user from a merchant system; generating a first risk score based on the transaction request and a first set of transaction data received prior to the transaction request; processing a transaction request approval based on the first risk score not satisfying a first threshold; receiving a risk score request associated with the first payment transaction, where the risk score request is received after the transaction request has been approved; generating a second risk score based on a second set of transaction data received after the first risk score is determined; and automatically classifying the first payment transaction as potentially fraudulent in response to determining that the second risk score satisfies a second threshold.
-
6.
公开(公告)号:WO2022082091A1
公开(公告)日:2022-04-21
申请号:PCT/US2021/055374
申请日:2021-10-18
Applicant: VISA INTERNATIONAL SERVICE ASSOCIATION
Inventor: DONG, Bo , WU, Yuhang , LIN, Yu-San , YEH, Michael , YANG, Hao
IPC: G08B23/00
Abstract: Described are a system, method, and computer program product for user network activity anomaly detection. The method includes receiving network resource data associated with network resource activity of a plurality of users and generating a plurality of layers of a multilayer graph from the network resource data. Each layer of the plurality of layers may include a plurality of nodes, which are associated with users, connected by a plurality of edges, which are representative of node interdependency. The method also includes generating a plurality of adjacency matrices from the plurality of layers and generating a merged single layer graph based on a weighted sum of the plurality of adjacency matrices. The method further includes generating anomaly scores for each node in the merged single layer graph and determining a set of anomalous users based on the anomaly scores.
-
公开(公告)号:WO2020068831A1
公开(公告)日:2020-04-02
申请号:PCT/US2019/052703
申请日:2019-09-24
Applicant: VISA INTERNATIONAL SERVICE ASSOCIATION
Inventor: SANKAR, Aravind , WU, Yanhong , GOU, Liang , ZHANG, Wei , YANG, Hao
IPC: G06F16/901 , G06N5/02 , G06N20/00
Abstract: A method includes extracting, by an analysis computer, a plurality of first datasets from a plurality of graph snapshots using a structural self-attention module. The analysis computer can then extract at least a second dataset from the plurality of first datasets using a temporal self-attention module across the plurality of graph snapshots. The analysis computer can then perform graph context prediction with at least the second dataset.
-
公开(公告)号:WO2019152050A1
公开(公告)日:2019-08-08
申请号:PCT/US2018/016704
申请日:2018-02-02
Applicant: VISA INTERNATIONAL SERVICE ASSOCIATION
Inventor: YANG, Hao , TUCK, Jonathan
IPC: G06N99/00
Abstract: A method is disclosed. The method includes a) obtaining a data set comprising a subset of labeled data and a subset of unlabeled data, b) determining a minimization equation characterizing a semi-supervised learning process, the minimization equation comprising a convex component and a non-convex component; c) applying a smoothing function to the minimization equation to obtain a smoothed minimization equation; d) determining a surrogate function based on the smoothed minimization equation and the data set, wherein the surrogate function includes a convex surrogate function component and a non-convex surrogate function component; e) performing a minimization process on the surrogate function resulting in a temporary minimum solution; and f) repeating d) and e) until a global minimum solution is determined. The method also includes creating a support vector machine using the global minimum solution.
-
公开(公告)号:WO2019143946A1
公开(公告)日:2019-07-25
申请号:PCT/US2019/014206
申请日:2019-01-18
Applicant: VISA INTERNATIONAL SERVICE ASSOCIATION
Inventor: SHIN, Bonggun , YANG, Hao
CPC classification number: G06N3/0454 , G06N3/08
Abstract: Provided is a method for compressing a neural network model. The method may include receiving embedding data associated with a first number of embeddings in a first neural network model, determining a plurality of distillation layers of a second neural network model, wherein the plurality of distillation layers is associated with the first number of embeddings and the plurality of distillation layers is configured to reduce the first number of embeddings to a second number of embeddings, generating an output layer of the second neural network model including a plurality of embeddings corresponding to the second number of embeddings, and training the second neural network model based on the first neural network model. A system and computer program product are also disclosed.
-
公开(公告)号:WO2018170311A1
公开(公告)日:2018-09-20
申请号:PCT/US2018/022727
申请日:2018-03-15
Applicant: VISA INTERNATIONAL SERVICE ASSOCIATION
Inventor: GUO, Liang , YANG, Hao
IPC: G06Q30/02
Abstract: A computer system can perform a semi-supervised machine learning processes to cluster a plurality of entities within a population based on their features and associated labels. The computer system can generate visualization data representing the clusters of entities and associated labels for displaying on a user interface. A user can review the clustering of entities and use the user interface to add or modify the labels associated with a particular entity or set of entities. The computer system can use the user's feedback to update the labels and then re-determine the clustering of entities using the semi-supervised machine learning process with the updated labels as input. As such, the computer system can use the user's feedback to improve the accuracy of the machine learning model without requiring a larger amount of labeled input data.
-
-
-
-
-
-
-
-
-