Patents by Inventor Andeep S. Toor

Andeep S. Toor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10936914
    Abstract: A method, computer program product, and a system where a processor(s) obtains an original image. The processor(s) applies a number of filters to the original image to generate a group of filtered images. The processor(s) stacks the original image with the filtered images in a three dimensional array; each layer of the stack comprises a separate filtered image or the original image and the three dimensional array comprises an augmented version of the original image. The processor(s) facilitates classification of the original image by a deep convolution neural network, where the facilitating comprises providing the augmented version of the original image to the deep convolution neural network, and where the deep convolution neural network classifies the original image based on applying a classification model to the augmented version of the original image The processor(s) receives the classification of the original image from the deep convolution neural network.
    Type: Grant
    Filed: July 31, 2018
    Date of Patent: March 2, 2021
    Assignee: International Business Machines Corporation
    Inventors: Andeep S. Toor, Mohamed N. Ahmed, Michelle H. Jung, Krista Kinnard, Anna Podgornyak, Daniel Anderson, Emily Fontaine
  • Patent number: 10878033
    Abstract: An embodiment of the invention may include a method, computer program product and system for generating follow-up questions based on machine learning utilizing a computing device. The embodiment may include receiving an input question from a user. The embodiment may include parsing the received input question to extract input question components. Parsing utilizes natural language processing techniques. The embodiment may include executing trained question component models to predict follow-up question components. The extracted input question components are utilized as inputs to the trained question component models. The embodiment may include combining the predicted follow-up question components to generate one or more follow-up questions. The embodiment may include returning the one or more follow-up questions to the user.
    Type: Grant
    Filed: December 1, 2017
    Date of Patent: December 29, 2020
    Assignee: International Business Machines Corporation
    Inventors: Mohamed N. Ahmed, Charles E. Beller, William G. Dubyak, Palani Sakthi, Kristen M. Summers, Andeep S. Toor
  • Publication number: 20200081978
    Abstract: Detection and classification of personally identifiable information includes identifying a document with a known author. A first set of features of the document is extracted using natural language processing, and a second set of features of the document is extracted based upon one or more past documents for the known author using a recurrent neural network. The first set of features and the second set of features are classified using a classifier to produce classified extracted features. Personally identifiable information is labeled in the document based upon the classified extracted features.
    Type: Application
    Filed: September 7, 2018
    Publication date: March 12, 2020
    Applicant: International Business Machines Corporation
    Inventors: Mohamed N. Ahmed, Andeep S. Toor
  • Patent number: 10585989
    Abstract: Detection and classification of personally identifiable information includes identifying a document with a known author. A first set of features of the document is extracted using natural language processing, and a second set of features of the document is extracted based upon one or more past documents for the known author using a recurrent neural network. The first set of features and the second set of features are classified using a classifier to produce classified extracted features. Personally identifiable information is labeled in the document based upon the classified extracted features.
    Type: Grant
    Filed: September 7, 2018
    Date of Patent: March 10, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mohamed N. Ahmed, Andeep S. Toor
  • Publication number: 20200042833
    Abstract: A method, computer program product, and a system where a processor(s) obtains an original image. The processor(s) applies a number of filters to the original image to generate a group of filtered images. The processor(s) stacks the original image with the filtered images in a three dimensional array; each layer of the stack comprises a separate filtered image or the original image and the three dimensional array comprises an augmented version of the original image. The processor(s) facilitates classification of the original image by a deep convolution neural network, where the facilitating comprises providing the augmented version of the original image to the deep convolution neural network, and where the deep convolution neural network classifies the original image based on applying a classification model to the augmented version of the original image The processor(s) receives the classification of the original image from the deep convolution neural network.
    Type: Application
    Filed: July 31, 2018
    Publication date: February 6, 2020
    Inventors: Andeep S. Toor, Mohamed N. Ahmed, Michelle H. Jung, Krista Kinnard, Anna Podgornyak, Daniel Anderson, Emily Fontaine
  • Patent number: 10554686
    Abstract: A set and a second set of collections of forecasted feature vectors are selected from a repository for a future time window, a cyber-attack being in progress in a data processing environment at the present time, a collection in the set and a collection in the second set indicating an event related to the cyber-attack in a first region and a second event in a second region, respectively, of the environment at a discrete time. The events corresponding to the collections are classified, using an LTSM network, into a class of cyber-attack. From a mapping between a set of phases of the cyber-attack and a set of classes, a phase that corresponds to the class is predicted as likely to occur during the future time window in the region.
    Type: Grant
    Filed: May 22, 2018
    Date of Patent: February 4, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mohamed N. Ahmed, Aaron K. Baughman, Nicholas A. McCrory, Andeep S. Toor, Michelle Welcks
  • Publication number: 20190171726
    Abstract: An embodiment of the invention may include a method, computer program product and system for generating follow-up questions based on machine learning utilizing a computing device. The embodiment may include receiving an input question from a user. The embodiment may include parsing the received input question to extract input question components. Parsing utilizes natural language processing techniques. The embodiment may include executing trained question component models to predict follow-up question components. The extracted input question components are utilized as inputs to the trained question component models. The embodiment may include combining the predicted follow-up question components to generate one or more follow-up questions. The embodiment may include returning the one or more follow-up questions to the user.
    Type: Application
    Filed: December 1, 2017
    Publication date: June 6, 2019
    Inventors: Mohamed N. Ahmed, Charles E. Beller, WILLIAM G. DUBYAK, Palani Sakthi, Kristen M. Summers, Andeep S. Toor
  • Publication number: 20180270269
    Abstract: A set and a second set of collections of forecasted feature vectors are selected from a repository for a future time window, a cyber-attack being in progress in a data processing environment at the present time, a collection in the set and a collection in the second set indicating an event related to the cyber-attack in a first region and a second event in a second region, respectively, of the environment at a discrete time. The events corresponding to the collections are classified, using an LTSM network, into a class of cyber-attack. From a mapping between a set of phases of the cyber-attack and a set of classes, a phase that corresponds to the class is predicted as likely to occur during the future time window in the region.
    Type: Application
    Filed: May 22, 2018
    Publication date: September 20, 2018
    Applicant: International Business Machines Corporation
    Inventors: Mohamed N. Ahmed, Aaron K. Baughman, Nicholas A. McCrory, Andeep S. Toor, Michelle Welcks
  • Patent number: 10015189
    Abstract: A set and a second set of collections of forecasted feature vectors are selected from a repository for a future time window, a cyber-attack being in progress in a data processing environment at the present time, a collection in the set and a collection in the second set indicating an event related to the cyber-attack in a first region and a second event in a second region, respectively, of the environment at a discrete time. The set of collections is input at a first input and the second set of collections is input at a second input in the LSTM. The events corresponding to the collections are classified into a class of cyber-attack. From a mapping between a set of phases of the cyber-attack and a set of classes, a phase that corresponds to the class is predicted as likely to occur during the future time window in the region.
    Type: Grant
    Filed: February 9, 2016
    Date of Patent: July 3, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINE CORPORATION
    Inventors: Mohamed N. Ahmed, Aaron K. Baughman, Nicholas A. McCrory, Andeep S. Toor, Michelle Welcks
  • Patent number: 9996772
    Abstract: A transformed image is received. The transformed image includes an other-than-visible light image that has been captured using a transformation device. A region of the transformed image is isolated, the region being less than an entirety of the transformed image. By applying to the region a convolutional Neural Network (CNN) which executes using a processor and a memory, and by processing only the region of the transformed image, an object of interest is detected in the region. Upon detecting, an indication is produced to indicate the presence of the object of interest in the region.
    Type: Grant
    Filed: April 28, 2016
    Date of Patent: June 12, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mohamed N. Ahmed, Andeep S. Toor
  • Patent number: 9860268
    Abstract: A set of collections of forecasted feature vectors is selected from a repository for a future time window after a present time, a cyber-attack being in progress in a data processing environment at the present time, a collection in the set having feature vectors that are indicative of an event related to the cyber-attack in a region of the environment at a discrete time. The events corresponding to the collections in the set are classified into a class of cyber-attack. From a mapping between a set of phases of the cyber-attack and a set of classes, a phase is determined that corresponds to the class. The determined phase is predicted as likely to occur during the future time window in the region.
    Type: Grant
    Filed: February 9, 2016
    Date of Patent: January 2, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mohamed N. Ahmed, Aaron K. Baughman, Nicholas A. McCrory, Andeep S. Toor, Michelle Welcks
  • Publication number: 20170316285
    Abstract: A transformed image is received. The transformed image includes an other-than-visible light image that has been captured using a transformation device. A region of the transformed image is isolated, the region being less than an entirety of the transformed image. By applying to the region a convolutional Neural Network (CNN) which executes using a processor and a memory, and by processing only the region of the transformed image, an object of interest is detected in the region. Upon detecting, an indication is produced to indicate the presence of the object of interest in the region.
    Type: Application
    Filed: April 28, 2016
    Publication date: November 2, 2017
    Applicant: International Business Machines Corporation
    Inventors: Mohamed N. Ahmed, Andeep S. Toor
  • Publication number: 20170230408
    Abstract: A set of collections of forecasted feature vectors is selected from a repository for a future time window after a present time, a cyber-attack being in progress in a data processing environment at the present time, a collection in the set having feature vectors that are indicative of an event related to the cyber-attack in a region of the environment at a discrete time. The events corresponding to the collections in the set are classified into a class of cyber-attack. From a mapping between a set of phases of the cyber-attack and a set of classes, a phase is determined that corresponds to the class. The determined phase is predicted as likely to occur during the future time window in the region.
    Type: Application
    Filed: February 9, 2016
    Publication date: August 10, 2017
    Applicant: International Business Machines Corporation
    Inventors: MOHAMED N. AHMED, Aaron K. Baughman, Nicholas A. McCrory, Andeep S. Toor, Michelle Welcks
  • Publication number: 20170230409
    Abstract: A set and a second set of collections of forecasted feature vectors are selected from a repository for a future time window, a cyber-attack being in progress in a data processing environment at the present time, a collection in the set and a collection in the second set indicating an event related to the cyber-attack in a first region and a second event in a second region, respectively, of the environment at a discrete time. The set of collections is input at a first input and the second set of collections is input at a second input in the LSTM. The events corresponding to the collections are classified into a class of cyber-attack. From a mapping between a set of phases of the cyber-attack and a set of classes, a phase that corresponds to the class is predicted as likely to occur during the future time window in the region.
    Type: Application
    Filed: February 9, 2016
    Publication date: August 10, 2017
    Applicant: International Business Machines Corporation
    Inventors: MOHAMED N. AHMED, Aaron K. Baughman, Nicholas A. McCrory, Andeep S. Toor, Michelle Welcks