Patents by Inventor Andrea Giovannini
Andrea Giovannini has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240362380Abstract: A computer-implemented method, a computer system and a computer program product build a product model that indicates an electrostatic discharge (ESD) sensitivity level. The method includes identifying a sensitive component in a model of an electronics device and mapping the sensitive component to a location in the electronics device. The method also includes obtaining ESD metadata for the sensitive component. In addition, the method includes determining an ESD voltage threshold for the sensitive component based on the ESD metadata for the sensitive component. Lastly, the method includes generating the product model of the electronics device, wherein the product model includes a plurality of sensitive components mapped to a plurality of locations in the electronics device and an indication of the ESD voltage threshold for each sensitive component at a respective mapped location in the electronic device.Type: ApplicationFiled: April 25, 2023Publication date: October 31, 2024Inventors: Jacob Dixon, Steven Chandler Borrillo, Andrea Giovannini, Gandhi Sivakumar
-
Publication number: 20240320499Abstract: The exemplary embodiments disclose a method, a computer system, and a computer program product for detecting malware. The exemplary embodiments may include aggregating known malware patterns by storing malware patterns and related malware categories of the malware patterns. The exemplary embodiments may additionally include training a first machine-learning system, comprising a generator portion and a discriminator portion, by using the known malware patterns and the related malware categories as training data. The exemplary embodiments may also include generating additional synthetic code patterns by feeding random code samples to the trained first machine-learning system. The exemplary embodiments may further include training a second machine-learning system by using benevolent code patterns and the generated additional synthetic code patterns as training data.Type: ApplicationFiled: May 30, 2024Publication date: September 26, 2024Inventors: Tim Uwe SCHEIDELER, Arjun UDUPI RAGHAVENDRA, Matthias SEUL, Andrea GIOVANNINI
-
Patent number: 12099533Abstract: In several aspects for querying a data source represented by data object embeddings in a vector space, a processor inputs, to a trained embedding generation model, a received query and at least one token for receiving from the trained embedding generation model a set of embeddings of the vector space. The set of embeddings comprises an embedding of the received query and at least one embedding of the at least one token respectively, wherein the embedding of each token is a prediction of an embedding of a supplement of the query. The data object embeddings may be searched for data object embeddings that match the set of embeddings. This may result in search result embeddings of the set of embeddings. Data objects that are represented by the search result embeddings may be determined. At least part of the determined data objects may be provided.Type: GrantFiled: September 23, 2022Date of Patent: September 24, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Richard Obinna Osuala, Dominik Moritz Stein, Andrea Giovannini
-
Patent number: 12039455Abstract: The exemplary embodiments disclose a method, a computer system, and a computer program product for detecting malware. The exemplary embodiments may include aggregating known malware patterns by storing malware patterns and related malware categories of the malware patterns. The exemplary embodiments may additionally include training a first machine-learning system, comprising a generator portion and a discriminator portion, by using the known malware patterns and the related malware categories as training data. The exemplary embodiments may also include generating additional synthetic code patterns by feeding random code samples to the trained first machine-learning system. The exemplary embodiments may further include training a second machine-learning system by using benevolent code patterns and the generated additional synthetic code patterns as training data.Type: GrantFiled: February 22, 2021Date of Patent: July 16, 2024Assignee: KYNDRYL, INC.Inventors: Tim Uwe Scheideler, Arjun Udupi Raghavendra, Matthias Seul, Andrea Giovannini
-
Patent number: 12033730Abstract: The exemplary embodiments disclose a system and method, a computer program product, and a computer system for assigning medical codes. The exemplary embodiments may include receiving a medical record in machine-readable text-form, wherein the medical record comprises at least one treatment, converting a portion of the medical record into a determined first medical code of a first length, querying a knowledge graph comprising medical records and a coding catalog for a second medical code of higher order than the first medical code, wherein the second medical code relates to the first medical code, and searching evidence in the medical record for the second medical code by comparing at least a portion of clear text relating to the second medical code with the medical record.Type: GrantFiled: April 14, 2020Date of Patent: July 9, 2024Inventors: Matthias Reumann, Andrea Giovannini
-
Publication number: 20240169028Abstract: Machine learning using dependency priors includes determining task-dependent feature dependencies for a group of features extracted from non-imaging data received with the computer hardware. The non-imaging data can be reformatted based on the task-dependent feature dependencies. The reformatting can convert strongly dependent features among the group of features into one or more subgroups based on task-specific, feature dependency-based priors. Based on the reformatted data, a machine learning prediction can be generated by a machine learning model.Type: ApplicationFiled: November 16, 2022Publication date: May 23, 2024Inventors: Hongzhi Wang, Andrea Giovannini, Kristen Beck, Tanveer Syeda-Mahmood
-
Publication number: 20240144274Abstract: A computer-implemented method for enabling transaction-risk evaluation by resource-limited devices. The method includes receiving from a financial network transaction data, defining transactions in the network, and generating, based on the transaction data, a transaction graph comprising nodes, representing parties to transactions, interconnected by edges representing transactions between parties represented by the nodes. For each of at least some nodes, at least one risk attribute provided in the transaction graph. The method includes receiving from a resource-limited device a request describing a potential transaction, identifying at least one counterparty node, deriving transaction-risk data, dependent on aggregated risk attributes of the counterparty node and a selected set of nodes reachable from that node via edges, and sending to the device a response comprising the transaction-risk data for evaluation of risk of the potential transaction.Type: ApplicationFiled: April 8, 2022Publication date: May 2, 2024Inventors: Tamas Visegrady, Andrea Giovannini
-
Publication number: 20240119137Abstract: A computer-implemented method or protecting a machine-learning model against training data attacks is disclosed. The method comprises performing an initial training of a machine-learning system with controlled training data, thereby building a trained initial machine-learning model and identifying high-impact training data from a larger training data set than in the controlled training data, wherein the identified individual training data have an impact on a training cycle of the training of machine-learning model, wherein the impact is larger than a predefined impact threshold value. The method also comprises building an artificial pseudo-malicious training data set from the identified high-impact training data and retraining the machine-learning system comprising the trained initial machine-learning model using the artificial pseudo-malicious training data set.Type: ApplicationFiled: November 21, 2022Publication date: April 11, 2024Inventors: Matthias Seul, Andrea Giovannini, Frederik Frank Flother, Tim Uwe Scheideler
-
Patent number: 11954612Abstract: A method includes receiving a first query by a computing device and assigning the first query to a plurality of cognitive engines, wherein each of the plurality of cognitive engines include different characteristics for processing data. The method also includes, responsive to receiving a response from each of the plurality of cognitive engines for the first query, comparing the received responses from the plurality of cognitive engines. The method also included responsive to determining a difference between a first response from a first cognitive engine and a second response from a second cognitive engine is above a predetermined threshold value, performing a response mediation process until the difference is below the predetermined threshold value. The method also includes selecting a first final response from the received responses for the first query and the second query and displaying the first final response to a user.Type: GrantFiled: September 5, 2017Date of Patent: April 9, 2024Assignee: International Business Machines CorporationInventors: Andrea Giovannini, Florian Graf, Stefan Ravizza, Tim U. Scheideler
-
Publication number: 20240111777Abstract: Mechanisms are provided to implement a visual analytics pipeline. The mechanisms generate, from an input database of records, a chronology-aware graph data structure of a plurality of records based features specified in an ontology data structure. The chronology-aware graph data structure has vertices representing one or more of events or records based features corresponding to events, and edges representing chronological relationships between events. The mechanisms execute a chronology-aware graph query on the chronology-aware graph data structure to generate a filtered set of vertices and corresponding features corresponding to criteria of the chronology-aware graph query.Type: ApplicationFiled: December 14, 2023Publication date: April 4, 2024Inventors: Andrea Giovannini, Joy Tzung-yu Wu, Tanveer Syeda-Mahmood, Ashutosh Jadhav
-
Publication number: 20240111794Abstract: In several aspects for querying a data source represented by data object embeddings in a vector space, a processor inputs, to a trained embedding generation model, a received query and at least one token for receiving from the trained embedding generation model a set of embeddings of the vector space. The set of embeddings comprises an embedding of the received query and at least one embedding of the at least one token respectively, wherein the embedding of each token is a prediction of an embedding of a supplement of the query. The data object embeddings may be searched for data object embeddings that match the set of embeddings. This may result in search result embeddings of the set of embeddings. Data objects that are represented by the search result embeddings may be determined. At least part of the determined data objects may be provided.Type: ApplicationFiled: September 23, 2022Publication date: April 4, 2024Inventors: Richard Obinna Osuala, Dominik Moritz Stein, Andrea Giovannini
-
Publication number: 20240104366Abstract: A computer implemented method includes transforming a set of received samples from a set of data into a multiplexed graph, by creating a plurality of planes, each plane having the set of nodes and the set of edges. Each set of edges is associated with a given relation type from the set of relation types. Message passing walks are alternated within and across the plurality of planes of the multiplexed graph using a graph neural network (GNN) layer. The GNN layer has a plurality of units where each unit outputs an aggregation of two parallel sub-units. Sub-units include a typed GNN layer that allows different permutations of connectivity patterns between intra-planar and inter-planar nodes. A task-specific supervision is used to train a set of weights of the GNN for the machine learning task.Type: ApplicationFiled: September 19, 2022Publication date: March 28, 2024Inventors: Niharika DSouza, Tanveer Syeda-Mahmood, Andrea Giovannini, Antonio Foncubierta Rodriguez
-
Patent number: 11928121Abstract: Mechanisms are provided to implement a visual analytics pipeline. The mechanisms generate, from an input database of records, a chronology-aware graph data structure of a plurality of records based features specified in an ontology data structure. The chronology-aware graph data structure has vertices representing one or more of events or records based features corresponding to events, and edges representing chronological relationships between events. The mechanisms execute a chronology-aware graph query on the chronology-aware graph data structure to generate a filtered set of vertices and corresponding features corresponding to criteria of the chronology-aware graph query.Type: GrantFiled: September 13, 2021Date of Patent: March 12, 2024Assignee: International Business Machines CorporationInventors: Andrea Giovannini, Joy Tzung-Yu Wu, Tanveer Syeda-Mahmood, Ashutosh Jadhav
-
Patent number: 11886587Abstract: Aspects of the present invention disclose a method, computer program product, and system for detecting a malicious process by a selected instance of an anti-malware system. The method includes one or more processors examining a process for indicators of compromise to the process. The method further includes one or more processors determining a categorization of the process based upon a result of the examination. In response to determining that the categorization of the process does not correspond to a known benevolent process and a known malicious process, the method further includes one or more processors executing the process in a secure enclave. The method further includes one or more processors collecting telemetry data from executing the process in the secure enclave. The method further includes one or more processors passing the collected telemetry data to a locally trained neural network system.Type: GrantFiled: October 13, 2020Date of Patent: January 30, 2024Assignee: KYNDRYL, INCInventors: Arjun Udupi Raghavendra, Tim Uwe Scheideler, Matthias Seul, Andrea Giovannini
-
Patent number: 11880755Abstract: A computer-implemented method for classification of data by a machine learning system using a logic constraint for reducing a data labeling requirement. The computer-implemented method includes: generating a first embedding space from a first partially labeled training data set, wherein in the first embedding space, content-wise related training data of the first partially labeled training data are clustered together, determining at least two clusters in the first embedding space formed from the first partially labeled training data, and training a machine learning model based, at least in part, on a second partially labeled training data set and the at least two clusters, wherein the at least two clusters are used as training constraints.Type: GrantFiled: May 14, 2020Date of Patent: January 23, 2024Assignee: International Business Machines CorporationInventors: Patrick Lustenberger, Thomas Brunschwiler, Andrea Giovannini, Adam Ivankay
-
Patent number: 11874863Abstract: The present disclosure relates to a method for query expansion. The method comprises: a) receiving a current query having at least one search term; b) inputting the at least one search term of the current query to a set of one or more query expansion modules, wherein the query expansion modules are configured to predict expansion terms of input terms; c) receiving from the set of expansion modules candidate expansion terms of the search term; d) modifying the current query using at least part of the candidate expansion terms, resulting in a modified query having at least one modified search term, The method further comprises repeating steps b) to d) using the modified query as the current query, the repeating being performed until a predefined stopping criterion is fulfilled.Type: GrantFiled: April 3, 2020Date of Patent: January 16, 2024Assignee: International Business Machines CorporationInventors: Ivan Girardi, Harold Douglas Dykeman, Andrea Giovannini, Adam Ivankay, Chiara Marchiori, Kevin Thandiackal, Mario Zusag
-
Publication number: 20230401479Abstract: Computer-implemented methods are provided for generating machine learning model for multimodal data inference tasks. Such a method includes, for each sample in a training dataset of multimodal data samples, encoding the sample to produce a compressed vector representation of the sample in a k-dimensional latent space, and perturbing features of the sample to identify, for each dimension of the latent space, a set of active features perturbation of each of which produces more than a threshold change in the vector representation in that dimension. The method further comprises generating a sample graph having nodes interconnected by edges, wherein the nodes comprise nodes representing respective said features of the sample and edges interconnecting nodes indicate the active features for each dimension. The sample graph is then used to train a graph neural network model to perform the multimodal data inference task. Multimodal data inference systems employing such models are also provided.Type: ApplicationFiled: June 13, 2022Publication date: December 14, 2023Inventors: Andrea Giovannini, Antonio Foncubierta Rodriguez, Niharika DSouza, Tanveer Syeda-Mahmood, HONGZHI WANG
-
Publication number: 20230376829Abstract: A processor may gather raw data comprising a plurality of characteristic data samples of a target user group. The processor may categorize the characteristic data samples into a plurality of user-related classes and triggers. The processor may build an input property graph for each characteristic data sample. The processor may augment the input property graph by a concept of hierarchies. The processor may determine a modification vector from the augmented input property graph. The processor may train an encoder/decoder combination machine-learning system. An embedding vector and a modification vector are used as input for the decoder to build a trained machine-learning generative model.Type: ApplicationFiled: May 20, 2022Publication date: November 23, 2023Inventors: Andrea Giovannini, Frederik Frank Flöther, Patrick Lustenberger, David Ocheltree
-
Publication number: 20230325840Abstract: A computer-implemented method for enabling transaction-risk evaluation by resource-limited devices. The method includes receiving from a financial network transaction data, defining transactions in the network, and generating, based on the transaction data, a transaction graph comprising nodes, representing parties to transactions, interconnected by edges representing transactions between parties represented by the nodes. For each of at least some nodes, at least one risk attribute provided in the transaction graph. The method includes receiving from a resource-limited device a request describing a potential transaction, identifying at least one counterparty node, deriving transaction-risk data, dependent on aggregated risk attributes of the counterparty node and a selected set of nodes reachable from that node via edges, and sending to the device a response comprising the transaction-risk data for evaluation of risk of the potential transaction.Type: ApplicationFiled: April 8, 2022Publication date: October 12, 2023Inventors: Tamas Visegrady, Andrea Giovannini
-
Publication number: 20230252268Abstract: An approach for predicting a state of a test entity may be provided. The approach may include providing a test graph, corresponding to the test entity, and a conditional generative model, based on a graph neural network. The test graph may have a hybrid structure, which may be a static graph and a dynamic graph. The static graph may include a reference vertex associated with an entity. The reference vertex can be connected to peripheral vertices associated with permanent attributes of the entity. The dynamic graph may be connected to the reference vertex and include chronological vertices associated with transient attributes. The chronological vertices are chronologically ordered via oriented chronological edges. The approach may predict a next chronological state of the test graph based on applying the test graph to the conditional generative model.Type: ApplicationFiled: February 7, 2022Publication date: August 10, 2023Inventors: Andrea Giovannini, Matteo Manica