Patents by Inventor Andeep S. Toor
Andeep S. Toor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10936914Abstract: A method, computer program product, and a system where a processor(s) obtains an original image. The processor(s) applies a number of filters to the original image to generate a group of filtered images. The processor(s) stacks the original image with the filtered images in a three dimensional array; each layer of the stack comprises a separate filtered image or the original image and the three dimensional array comprises an augmented version of the original image. The processor(s) facilitates classification of the original image by a deep convolution neural network, where the facilitating comprises providing the augmented version of the original image to the deep convolution neural network, and where the deep convolution neural network classifies the original image based on applying a classification model to the augmented version of the original image The processor(s) receives the classification of the original image from the deep convolution neural network.Type: GrantFiled: July 31, 2018Date of Patent: March 2, 2021Assignee: International Business Machines CorporationInventors: Andeep S. Toor, Mohamed N. Ahmed, Michelle H. Jung, Krista Kinnard, Anna Podgornyak, Daniel Anderson, Emily Fontaine
-
Patent number: 10878033Abstract: An embodiment of the invention may include a method, computer program product and system for generating follow-up questions based on machine learning utilizing a computing device. The embodiment may include receiving an input question from a user. The embodiment may include parsing the received input question to extract input question components. Parsing utilizes natural language processing techniques. The embodiment may include executing trained question component models to predict follow-up question components. The extracted input question components are utilized as inputs to the trained question component models. The embodiment may include combining the predicted follow-up question components to generate one or more follow-up questions. The embodiment may include returning the one or more follow-up questions to the user.Type: GrantFiled: December 1, 2017Date of Patent: December 29, 2020Assignee: International Business Machines CorporationInventors: Mohamed N. Ahmed, Charles E. Beller, William G. Dubyak, Palani Sakthi, Kristen M. Summers, Andeep S. Toor
-
Publication number: 20200081978Abstract: Detection and classification of personally identifiable information includes identifying a document with a known author. A first set of features of the document is extracted using natural language processing, and a second set of features of the document is extracted based upon one or more past documents for the known author using a recurrent neural network. The first set of features and the second set of features are classified using a classifier to produce classified extracted features. Personally identifiable information is labeled in the document based upon the classified extracted features.Type: ApplicationFiled: September 7, 2018Publication date: March 12, 2020Applicant: International Business Machines CorporationInventors: Mohamed N. Ahmed, Andeep S. Toor
-
Patent number: 10585989Abstract: Detection and classification of personally identifiable information includes identifying a document with a known author. A first set of features of the document is extracted using natural language processing, and a second set of features of the document is extracted based upon one or more past documents for the known author using a recurrent neural network. The first set of features and the second set of features are classified using a classifier to produce classified extracted features. Personally identifiable information is labeled in the document based upon the classified extracted features.Type: GrantFiled: September 7, 2018Date of Patent: March 10, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mohamed N. Ahmed, Andeep S. Toor
-
Publication number: 20200042833Abstract: A method, computer program product, and a system where a processor(s) obtains an original image. The processor(s) applies a number of filters to the original image to generate a group of filtered images. The processor(s) stacks the original image with the filtered images in a three dimensional array; each layer of the stack comprises a separate filtered image or the original image and the three dimensional array comprises an augmented version of the original image. The processor(s) facilitates classification of the original image by a deep convolution neural network, where the facilitating comprises providing the augmented version of the original image to the deep convolution neural network, and where the deep convolution neural network classifies the original image based on applying a classification model to the augmented version of the original image The processor(s) receives the classification of the original image from the deep convolution neural network.Type: ApplicationFiled: July 31, 2018Publication date: February 6, 2020Inventors: Andeep S. Toor, Mohamed N. Ahmed, Michelle H. Jung, Krista Kinnard, Anna Podgornyak, Daniel Anderson, Emily Fontaine
-
Patent number: 10554686Abstract: A set and a second set of collections of forecasted feature vectors are selected from a repository for a future time window, a cyber-attack being in progress in a data processing environment at the present time, a collection in the set and a collection in the second set indicating an event related to the cyber-attack in a first region and a second event in a second region, respectively, of the environment at a discrete time. The events corresponding to the collections are classified, using an LTSM network, into a class of cyber-attack. From a mapping between a set of phases of the cyber-attack and a set of classes, a phase that corresponds to the class is predicted as likely to occur during the future time window in the region.Type: GrantFiled: May 22, 2018Date of Patent: February 4, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mohamed N. Ahmed, Aaron K. Baughman, Nicholas A. McCrory, Andeep S. Toor, Michelle Welcks
-
Publication number: 20190171726Abstract: An embodiment of the invention may include a method, computer program product and system for generating follow-up questions based on machine learning utilizing a computing device. The embodiment may include receiving an input question from a user. The embodiment may include parsing the received input question to extract input question components. Parsing utilizes natural language processing techniques. The embodiment may include executing trained question component models to predict follow-up question components. The extracted input question components are utilized as inputs to the trained question component models. The embodiment may include combining the predicted follow-up question components to generate one or more follow-up questions. The embodiment may include returning the one or more follow-up questions to the user.Type: ApplicationFiled: December 1, 2017Publication date: June 6, 2019Inventors: Mohamed N. Ahmed, Charles E. Beller, WILLIAM G. DUBYAK, Palani Sakthi, Kristen M. Summers, Andeep S. Toor
-
Publication number: 20180270269Abstract: A set and a second set of collections of forecasted feature vectors are selected from a repository for a future time window, a cyber-attack being in progress in a data processing environment at the present time, a collection in the set and a collection in the second set indicating an event related to the cyber-attack in a first region and a second event in a second region, respectively, of the environment at a discrete time. The events corresponding to the collections are classified, using an LTSM network, into a class of cyber-attack. From a mapping between a set of phases of the cyber-attack and a set of classes, a phase that corresponds to the class is predicted as likely to occur during the future time window in the region.Type: ApplicationFiled: May 22, 2018Publication date: September 20, 2018Applicant: International Business Machines CorporationInventors: Mohamed N. Ahmed, Aaron K. Baughman, Nicholas A. McCrory, Andeep S. Toor, Michelle Welcks
-
Patent number: 10015189Abstract: A set and a second set of collections of forecasted feature vectors are selected from a repository for a future time window, a cyber-attack being in progress in a data processing environment at the present time, a collection in the set and a collection in the second set indicating an event related to the cyber-attack in a first region and a second event in a second region, respectively, of the environment at a discrete time. The set of collections is input at a first input and the second set of collections is input at a second input in the LSTM. The events corresponding to the collections are classified into a class of cyber-attack. From a mapping between a set of phases of the cyber-attack and a set of classes, a phase that corresponds to the class is predicted as likely to occur during the future time window in the region.Type: GrantFiled: February 9, 2016Date of Patent: July 3, 2018Assignee: INTERNATIONAL BUSINESS MACHINE CORPORATIONInventors: Mohamed N. Ahmed, Aaron K. Baughman, Nicholas A. McCrory, Andeep S. Toor, Michelle Welcks
-
Patent number: 9996772Abstract: A transformed image is received. The transformed image includes an other-than-visible light image that has been captured using a transformation device. A region of the transformed image is isolated, the region being less than an entirety of the transformed image. By applying to the region a convolutional Neural Network (CNN) which executes using a processor and a memory, and by processing only the region of the transformed image, an object of interest is detected in the region. Upon detecting, an indication is produced to indicate the presence of the object of interest in the region.Type: GrantFiled: April 28, 2016Date of Patent: June 12, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mohamed N. Ahmed, Andeep S. Toor
-
Patent number: 9860268Abstract: A set of collections of forecasted feature vectors is selected from a repository for a future time window after a present time, a cyber-attack being in progress in a data processing environment at the present time, a collection in the set having feature vectors that are indicative of an event related to the cyber-attack in a region of the environment at a discrete time. The events corresponding to the collections in the set are classified into a class of cyber-attack. From a mapping between a set of phases of the cyber-attack and a set of classes, a phase is determined that corresponds to the class. The determined phase is predicted as likely to occur during the future time window in the region.Type: GrantFiled: February 9, 2016Date of Patent: January 2, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mohamed N. Ahmed, Aaron K. Baughman, Nicholas A. McCrory, Andeep S. Toor, Michelle Welcks
-
Publication number: 20170316285Abstract: A transformed image is received. The transformed image includes an other-than-visible light image that has been captured using a transformation device. A region of the transformed image is isolated, the region being less than an entirety of the transformed image. By applying to the region a convolutional Neural Network (CNN) which executes using a processor and a memory, and by processing only the region of the transformed image, an object of interest is detected in the region. Upon detecting, an indication is produced to indicate the presence of the object of interest in the region.Type: ApplicationFiled: April 28, 2016Publication date: November 2, 2017Applicant: International Business Machines CorporationInventors: Mohamed N. Ahmed, Andeep S. Toor
-
Publication number: 20170230408Abstract: A set of collections of forecasted feature vectors is selected from a repository for a future time window after a present time, a cyber-attack being in progress in a data processing environment at the present time, a collection in the set having feature vectors that are indicative of an event related to the cyber-attack in a region of the environment at a discrete time. The events corresponding to the collections in the set are classified into a class of cyber-attack. From a mapping between a set of phases of the cyber-attack and a set of classes, a phase is determined that corresponds to the class. The determined phase is predicted as likely to occur during the future time window in the region.Type: ApplicationFiled: February 9, 2016Publication date: August 10, 2017Applicant: International Business Machines CorporationInventors: MOHAMED N. AHMED, Aaron K. Baughman, Nicholas A. McCrory, Andeep S. Toor, Michelle Welcks
-
Publication number: 20170230409Abstract: A set and a second set of collections of forecasted feature vectors are selected from a repository for a future time window, a cyber-attack being in progress in a data processing environment at the present time, a collection in the set and a collection in the second set indicating an event related to the cyber-attack in a first region and a second event in a second region, respectively, of the environment at a discrete time. The set of collections is input at a first input and the second set of collections is input at a second input in the LSTM. The events corresponding to the collections are classified into a class of cyber-attack. From a mapping between a set of phases of the cyber-attack and a set of classes, a phase that corresponds to the class is predicted as likely to occur during the future time window in the region.Type: ApplicationFiled: February 9, 2016Publication date: August 10, 2017Applicant: International Business Machines CorporationInventors: MOHAMED N. AHMED, Aaron K. Baughman, Nicholas A. McCrory, Andeep S. Toor, Michelle Welcks