DETECTING ADVERSARIAL EXAMPLES USING LATENT NEIGHBORHOOD GRAPHS

    公开(公告)号:WO2022076234A1

    公开(公告)日:2022-04-14

    申请号:PCT/US2021/052798

    申请日:2021-09-30

    Abstract: Techniques are disclosed for performing adversarial object detection. In one example, a system obtains a feature vector upon receiving an object to be classified. The system then generates a graph using the feature vector for the object and other feature vectors that are respectively obtained from a reference set of objects, whereby the feature vector corresponds to a center node of the graph. The system uses a distance metric to select neighbor nodes from among the reference set of objects for inclusion into the graph, and then determines edge weights between nodes of the graph based on a distance between respective feature vectors between nodes. The system then applies a graph discriminator to the graph to classify the object as adversarial or benign, the graph discriminator being trained using (I) the feature vectors associated with nodes of the graph and (II) the edge weights between the nodes of the graph.

    USING AN ENROLLED BIOMETRIC DATASET TO DETECT ADVERSARIAL EXAMPLES IN BIOMETRICS-BASED AUTHENTICATION SYSTEM

    公开(公告)号:WO2021096694A1

    公开(公告)日:2021-05-20

    申请号:PCT/US2020/057959

    申请日:2020-10-29

    Abstract: A computer-implemented method for improving security of a biometrics-based authentication system comprises receiving, by one or more servers, enrolled biometric samples of an enrolled user during an enrollment stage of the biometrics-based authentication system. Augmented biometric samples are created by adding learned perturbations to the enrolled biometric samples of the enrolled user. During a request for authentication, submitted biometric samples are received from a second user purporting to be the enrolled user. The submitted biometric samples of the second user are compared to the enrolled biometric samples and to the augmented biometric samples of the enrolled user based on predefined metrics. Based on the comparison it is determined whether the submitted biometric samples of the second user have been modified to impersonate the enrolled user.

    BLOCKCHAIN-BASED ACCOUNTABLE DATA PUBLISHING AND USAGE

    公开(公告)号:WO2020112104A1

    公开(公告)日:2020-06-04

    申请号:PCT/US2018/062847

    申请日:2018-11-28

    Abstract: Described herein are a system and techniques for enabling user control over usage of their information, even when untrusted parties are involved. In embodiments of the disclosure, users are able to modify policy data on a decentralized network. A users information may be collected by a client device and provided to a host server. An encrypted version of the users information may be stored at the host server and when requested by a data consumer, the request may be processed on a private enclave of the host server. This may involve determining, based on a current status of the policy data on the decentralized network, whether the request is an authorized request. If so, then the information is decrypted, processed, and re-encrypted using a different cryptographic key. The requestor of the data may then be given access to the encrypted output.

    SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR DETERMINING FRAUD

    公开(公告)号:WO2022108767A1

    公开(公告)日:2022-05-27

    申请号:PCT/US2021/058151

    申请日:2021-11-05

    Abstract: A method of determining fraud includes: receiving a transaction request associated with a first payment transaction between a merchant and a user from a merchant system; generating a first risk score based on the transaction request and a first set of transaction data received prior to the transaction request; processing a transaction request approval based on the first risk score not satisfying a first threshold; receiving a risk score request associated with the first payment transaction, where the risk score request is received after the transaction request has been approved; generating a second risk score based on a second set of transaction data received after the first risk score is determined; and automatically classifying the first payment transaction as potentially fraudulent in response to determining that the second risk score satisfies a second threshold.

    SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR USER NETWORK ACTIVITY ANOMALY DETECTION

    公开(公告)号:WO2022082091A1

    公开(公告)日:2022-04-21

    申请号:PCT/US2021/055374

    申请日:2021-10-18

    Abstract: Described are a system, method, and computer program product for user network activity anomaly detection. The method includes receiving network resource data associated with network resource activity of a plurality of users and generating a plurality of layers of a multilayer graph from the network resource data. Each layer of the plurality of layers may include a plurality of nodes, which are associated with users, connected by a plurality of edges, which are representative of node interdependency. The method also includes generating a plurality of adjacency matrices from the plurality of layers and generating a merged single layer graph based on a weighted sum of the plurality of adjacency matrices. The method further includes generating anomaly scores for each node in the merged single layer graph and determining a set of anomalous users based on the anomaly scores.

    EFFICIENT METHOD FOR SEMI-SUPERVISED MACHINE LEARNING

    公开(公告)号:WO2019152050A1

    公开(公告)日:2019-08-08

    申请号:PCT/US2018/016704

    申请日:2018-02-02

    Abstract: A method is disclosed. The method includes a) obtaining a data set comprising a subset of labeled data and a subset of unlabeled data, b) determining a minimization equation characterizing a semi-supervised learning process, the minimization equation comprising a convex component and a non-convex component; c) applying a smoothing function to the minimization equation to obtain a smoothed minimization equation; d) determining a surrogate function based on the smoothed minimization equation and the data set, wherein the surrogate function includes a convex surrogate function component and a non-convex surrogate function component; e) performing a minimization process on the surrogate function resulting in a temporary minimum solution; and f) repeating d) and e) until a global minimum solution is determined. The method also includes creating a support vector machine using the global minimum solution.

    SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR COMPRESSING NEURAL NETWORK MODELS

    公开(公告)号:WO2019143946A1

    公开(公告)日:2019-07-25

    申请号:PCT/US2019/014206

    申请日:2019-01-18

    CPC classification number: G06N3/0454 G06N3/08

    Abstract: Provided is a method for compressing a neural network model. The method may include receiving embedding data associated with a first number of embeddings in a first neural network model, determining a plurality of distillation layers of a second neural network model, wherein the plurality of distillation layers is associated with the first number of embeddings and the plurality of distillation layers is configured to reduce the first number of embeddings to a second number of embeddings, generating an output layer of the second neural network model including a plurality of embeddings corresponding to the second number of embeddings, and training the second neural network model based on the first neural network model. A system and computer program product are also disclosed.

    MIXED-INITIATIVE MACHINE LEARNING SYSTEMS AND METHODS FOR DETERMINING SEGMENTATIONS

    公开(公告)号:WO2018170311A1

    公开(公告)日:2018-09-20

    申请号:PCT/US2018/022727

    申请日:2018-03-15

    Abstract: A computer system can perform a semi-supervised machine learning processes to cluster a plurality of entities within a population based on their features and associated labels. The computer system can generate visualization data representing the clusters of entities and associated labels for displaying on a user interface. A user can review the clustering of entities and use the user interface to add or modify the labels associated with a particular entity or set of entities. The computer system can use the user's feedback to update the labels and then re-determine the clustering of entities using the semi-supervised machine learning process with the updated labels as input. As such, the computer system can use the user's feedback to improve the accuracy of the machine learning model without requiring a larger amount of labeled input data.

Patent Agency Ranking