Abstract: The present disclosure generally relates to techniques for constructing a specialized artificial-intelligence (AI) architecture. The present disclosure relates to techniques for optimizing hyperparameters of the specialized AI architecture using reinforcement learning models, and generating a prediction of a user's behavior with respect to an obligation by executing the specialized AI architecture with the optimized hyperparameters. The specialized AI architecture can include a pre-processing layer that extracts features from unstructured user data and normalizes the features, a classifier layer that classifies users, and a normalization layer that normalizes the classifications of users.
Abstract: The present disclosure generally relates to techniques for constructing a specialized artificial-intelligence (AI) architecture. The present disclosure relates to techniques for optimizing hyperparameters of the specialized AI architecture using reinforcement learning models, and generating a prediction of a user's behavior with respect to an obligation by executing the specialized AI architecture with the optimized hyperparameters. The specialized AI architecture can include a pre-processing layer that extracts features from unstructured user data and normalizes the features, a classifier layer that classifies users, and a normalization layer that normalizes the classifications of users.
Abstract: The present disclosure generally relates to systems that include an artificial intelligence (AI) architecture for determining whether an image is manipulated. The architecture can include a constrained convolutional layer, separable convolutional layers, maximum-pooling layers, a global average-pooling layer, and a fully connected layer. In one specific example, the constrained convolutional layer can detect one or more image-manipulation fingerprints with respect to an image and can generate feature maps corresponding to the image. The global average-pooling layer can generate a vector of feature values by averaging the feature maps. The fully connected layer can then generate, based on the vector of feature values, an indication of whether the image was manipulated or not manipulated.
Abstract: The present disclosure generally relates to techniques for constructing an artificial-intelligence (AI) architecture. The present disclosure relates to techniques for executing the AI architecture to detect whether or not characters in a digital document have been manipulated. The AI architecture can be configured to classify each character in a digital document as manipulated or not manipulated by constructing a graph for each character, generating features for each node of the graph, and inputting a vector representation of the graph into a trained machine-learning model to generate the character classification.
Abstract: The present disclosure generally relates to systems that include an artificial intelligence (AI) architecture for determining whether an image is manipulated. The architecture can include a constrained convolutional layer, separable convolutional layers, maximum-pooling layers, a global average-pooling layer, and a fully connected layer. In one specific example, the constrained convolutional layer can detect one or more image-manipulation fingerprints with respect to an image and can generate feature maps corresponding to the image. The global average-pooling layer can generate a vector of feature values by averaging the feature maps. The fully connected layer can then generate, based on the vector of feature values, an indication of whether the image was manipulated or not manipulated.
Abstract: The present disclosure generally relates to systems that include an artificial intelligence (AI) architecture for determining whether an image is manipulated. The architecture can include a constrained convolutional layer, separable convolutional layers, maximum-pooling layers, a global average-pooling layer, and a fully connected layer. In one specific example, the constrained convolutional layer can detect one or more image-manipulation fingerprints with respect to an image and can generate feature maps corresponding to the image. The global average-pooling layer can generate a vector of feature values by averaging the feature maps. The fully connected layer can then generate, based on the vector of feature values, an indication of whether the image was manipulated or not manipulated.