Patents by Inventor Andrea Giovannini

Andrea Giovannini has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240362380
    Abstract: A computer-implemented method, a computer system and a computer program product build a product model that indicates an electrostatic discharge (ESD) sensitivity level. The method includes identifying a sensitive component in a model of an electronics device and mapping the sensitive component to a location in the electronics device. The method also includes obtaining ESD metadata for the sensitive component. In addition, the method includes determining an ESD voltage threshold for the sensitive component based on the ESD metadata for the sensitive component. Lastly, the method includes generating the product model of the electronics device, wherein the product model includes a plurality of sensitive components mapped to a plurality of locations in the electronics device and an indication of the ESD voltage threshold for each sensitive component at a respective mapped location in the electronic device.
    Type: Application
    Filed: April 25, 2023
    Publication date: October 31, 2024
    Inventors: Jacob Dixon, Steven Chandler Borrillo, Andrea Giovannini, Gandhi Sivakumar
  • Publication number: 20240320499
    Abstract: The exemplary embodiments disclose a method, a computer system, and a computer program product for detecting malware. The exemplary embodiments may include aggregating known malware patterns by storing malware patterns and related malware categories of the malware patterns. The exemplary embodiments may additionally include training a first machine-learning system, comprising a generator portion and a discriminator portion, by using the known malware patterns and the related malware categories as training data. The exemplary embodiments may also include generating additional synthetic code patterns by feeding random code samples to the trained first machine-learning system. The exemplary embodiments may further include training a second machine-learning system by using benevolent code patterns and the generated additional synthetic code patterns as training data.
    Type: Application
    Filed: May 30, 2024
    Publication date: September 26, 2024
    Inventors: Tim Uwe SCHEIDELER, Arjun UDUPI RAGHAVENDRA, Matthias SEUL, Andrea GIOVANNINI
  • Patent number: 12099533
    Abstract: In several aspects for querying a data source represented by data object embeddings in a vector space, a processor inputs, to a trained embedding generation model, a received query and at least one token for receiving from the trained embedding generation model a set of embeddings of the vector space. The set of embeddings comprises an embedding of the received query and at least one embedding of the at least one token respectively, wherein the embedding of each token is a prediction of an embedding of a supplement of the query. The data object embeddings may be searched for data object embeddings that match the set of embeddings. This may result in search result embeddings of the set of embeddings. Data objects that are represented by the search result embeddings may be determined. At least part of the determined data objects may be provided.
    Type: Grant
    Filed: September 23, 2022
    Date of Patent: September 24, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Richard Obinna Osuala, Dominik Moritz Stein, Andrea Giovannini
  • Patent number: 12039455
    Abstract: The exemplary embodiments disclose a method, a computer system, and a computer program product for detecting malware. The exemplary embodiments may include aggregating known malware patterns by storing malware patterns and related malware categories of the malware patterns. The exemplary embodiments may additionally include training a first machine-learning system, comprising a generator portion and a discriminator portion, by using the known malware patterns and the related malware categories as training data. The exemplary embodiments may also include generating additional synthetic code patterns by feeding random code samples to the trained first machine-learning system. The exemplary embodiments may further include training a second machine-learning system by using benevolent code patterns and the generated additional synthetic code patterns as training data.
    Type: Grant
    Filed: February 22, 2021
    Date of Patent: July 16, 2024
    Assignee: KYNDRYL, INC.
    Inventors: Tim Uwe Scheideler, Arjun Udupi Raghavendra, Matthias Seul, Andrea Giovannini
  • Patent number: 12033730
    Abstract: The exemplary embodiments disclose a system and method, a computer program product, and a computer system for assigning medical codes. The exemplary embodiments may include receiving a medical record in machine-readable text-form, wherein the medical record comprises at least one treatment, converting a portion of the medical record into a determined first medical code of a first length, querying a knowledge graph comprising medical records and a coding catalog for a second medical code of higher order than the first medical code, wherein the second medical code relates to the first medical code, and searching evidence in the medical record for the second medical code by comparing at least a portion of clear text relating to the second medical code with the medical record.
    Type: Grant
    Filed: April 14, 2020
    Date of Patent: July 9, 2024
    Inventors: Matthias Reumann, Andrea Giovannini
  • Publication number: 20240169028
    Abstract: Machine learning using dependency priors includes determining task-dependent feature dependencies for a group of features extracted from non-imaging data received with the computer hardware. The non-imaging data can be reformatted based on the task-dependent feature dependencies. The reformatting can convert strongly dependent features among the group of features into one or more subgroups based on task-specific, feature dependency-based priors. Based on the reformatted data, a machine learning prediction can be generated by a machine learning model.
    Type: Application
    Filed: November 16, 2022
    Publication date: May 23, 2024
    Inventors: Hongzhi Wang, Andrea Giovannini, Kristen Beck, Tanveer Syeda-Mahmood
  • Publication number: 20240144274
    Abstract: A computer-implemented method for enabling transaction-risk evaluation by resource-limited devices. The method includes receiving from a financial network transaction data, defining transactions in the network, and generating, based on the transaction data, a transaction graph comprising nodes, representing parties to transactions, interconnected by edges representing transactions between parties represented by the nodes. For each of at least some nodes, at least one risk attribute provided in the transaction graph. The method includes receiving from a resource-limited device a request describing a potential transaction, identifying at least one counterparty node, deriving transaction-risk data, dependent on aggregated risk attributes of the counterparty node and a selected set of nodes reachable from that node via edges, and sending to the device a response comprising the transaction-risk data for evaluation of risk of the potential transaction.
    Type: Application
    Filed: April 8, 2022
    Publication date: May 2, 2024
    Inventors: Tamas Visegrady, Andrea Giovannini
  • Publication number: 20240119137
    Abstract: A computer-implemented method or protecting a machine-learning model against training data attacks is disclosed. The method comprises performing an initial training of a machine-learning system with controlled training data, thereby building a trained initial machine-learning model and identifying high-impact training data from a larger training data set than in the controlled training data, wherein the identified individual training data have an impact on a training cycle of the training of machine-learning model, wherein the impact is larger than a predefined impact threshold value. The method also comprises building an artificial pseudo-malicious training data set from the identified high-impact training data and retraining the machine-learning system comprising the trained initial machine-learning model using the artificial pseudo-malicious training data set.
    Type: Application
    Filed: November 21, 2022
    Publication date: April 11, 2024
    Inventors: Matthias Seul, Andrea Giovannini, Frederik Frank Flother, Tim Uwe Scheideler
  • Patent number: 11954612
    Abstract: A method includes receiving a first query by a computing device and assigning the first query to a plurality of cognitive engines, wherein each of the plurality of cognitive engines include different characteristics for processing data. The method also includes, responsive to receiving a response from each of the plurality of cognitive engines for the first query, comparing the received responses from the plurality of cognitive engines. The method also included responsive to determining a difference between a first response from a first cognitive engine and a second response from a second cognitive engine is above a predetermined threshold value, performing a response mediation process until the difference is below the predetermined threshold value. The method also includes selecting a first final response from the received responses for the first query and the second query and displaying the first final response to a user.
    Type: Grant
    Filed: September 5, 2017
    Date of Patent: April 9, 2024
    Assignee: International Business Machines Corporation
    Inventors: Andrea Giovannini, Florian Graf, Stefan Ravizza, Tim U. Scheideler
  • Publication number: 20240111777
    Abstract: Mechanisms are provided to implement a visual analytics pipeline. The mechanisms generate, from an input database of records, a chronology-aware graph data structure of a plurality of records based features specified in an ontology data structure. The chronology-aware graph data structure has vertices representing one or more of events or records based features corresponding to events, and edges representing chronological relationships between events. The mechanisms execute a chronology-aware graph query on the chronology-aware graph data structure to generate a filtered set of vertices and corresponding features corresponding to criteria of the chronology-aware graph query.
    Type: Application
    Filed: December 14, 2023
    Publication date: April 4, 2024
    Inventors: Andrea Giovannini, Joy Tzung-yu Wu, Tanveer Syeda-Mahmood, Ashutosh Jadhav
  • Publication number: 20240111794
    Abstract: In several aspects for querying a data source represented by data object embeddings in a vector space, a processor inputs, to a trained embedding generation model, a received query and at least one token for receiving from the trained embedding generation model a set of embeddings of the vector space. The set of embeddings comprises an embedding of the received query and at least one embedding of the at least one token respectively, wherein the embedding of each token is a prediction of an embedding of a supplement of the query. The data object embeddings may be searched for data object embeddings that match the set of embeddings. This may result in search result embeddings of the set of embeddings. Data objects that are represented by the search result embeddings may be determined. At least part of the determined data objects may be provided.
    Type: Application
    Filed: September 23, 2022
    Publication date: April 4, 2024
    Inventors: Richard Obinna Osuala, Dominik Moritz Stein, Andrea Giovannini
  • Publication number: 20240104366
    Abstract: A computer implemented method includes transforming a set of received samples from a set of data into a multiplexed graph, by creating a plurality of planes, each plane having the set of nodes and the set of edges. Each set of edges is associated with a given relation type from the set of relation types. Message passing walks are alternated within and across the plurality of planes of the multiplexed graph using a graph neural network (GNN) layer. The GNN layer has a plurality of units where each unit outputs an aggregation of two parallel sub-units. Sub-units include a typed GNN layer that allows different permutations of connectivity patterns between intra-planar and inter-planar nodes. A task-specific supervision is used to train a set of weights of the GNN for the machine learning task.
    Type: Application
    Filed: September 19, 2022
    Publication date: March 28, 2024
    Inventors: Niharika DSouza, Tanveer Syeda-Mahmood, Andrea Giovannini, Antonio Foncubierta Rodriguez
  • Patent number: 11928121
    Abstract: Mechanisms are provided to implement a visual analytics pipeline. The mechanisms generate, from an input database of records, a chronology-aware graph data structure of a plurality of records based features specified in an ontology data structure. The chronology-aware graph data structure has vertices representing one or more of events or records based features corresponding to events, and edges representing chronological relationships between events. The mechanisms execute a chronology-aware graph query on the chronology-aware graph data structure to generate a filtered set of vertices and corresponding features corresponding to criteria of the chronology-aware graph query.
    Type: Grant
    Filed: September 13, 2021
    Date of Patent: March 12, 2024
    Assignee: International Business Machines Corporation
    Inventors: Andrea Giovannini, Joy Tzung-Yu Wu, Tanveer Syeda-Mahmood, Ashutosh Jadhav
  • Patent number: 11886587
    Abstract: Aspects of the present invention disclose a method, computer program product, and system for detecting a malicious process by a selected instance of an anti-malware system. The method includes one or more processors examining a process for indicators of compromise to the process. The method further includes one or more processors determining a categorization of the process based upon a result of the examination. In response to determining that the categorization of the process does not correspond to a known benevolent process and a known malicious process, the method further includes one or more processors executing the process in a secure enclave. The method further includes one or more processors collecting telemetry data from executing the process in the secure enclave. The method further includes one or more processors passing the collected telemetry data to a locally trained neural network system.
    Type: Grant
    Filed: October 13, 2020
    Date of Patent: January 30, 2024
    Assignee: KYNDRYL, INC
    Inventors: Arjun Udupi Raghavendra, Tim Uwe Scheideler, Matthias Seul, Andrea Giovannini
  • Patent number: 11880755
    Abstract: A computer-implemented method for classification of data by a machine learning system using a logic constraint for reducing a data labeling requirement. The computer-implemented method includes: generating a first embedding space from a first partially labeled training data set, wherein in the first embedding space, content-wise related training data of the first partially labeled training data are clustered together, determining at least two clusters in the first embedding space formed from the first partially labeled training data, and training a machine learning model based, at least in part, on a second partially labeled training data set and the at least two clusters, wherein the at least two clusters are used as training constraints.
    Type: Grant
    Filed: May 14, 2020
    Date of Patent: January 23, 2024
    Assignee: International Business Machines Corporation
    Inventors: Patrick Lustenberger, Thomas Brunschwiler, Andrea Giovannini, Adam Ivankay
  • Patent number: 11874863
    Abstract: The present disclosure relates to a method for query expansion. The method comprises: a) receiving a current query having at least one search term; b) inputting the at least one search term of the current query to a set of one or more query expansion modules, wherein the query expansion modules are configured to predict expansion terms of input terms; c) receiving from the set of expansion modules candidate expansion terms of the search term; d) modifying the current query using at least part of the candidate expansion terms, resulting in a modified query having at least one modified search term, The method further comprises repeating steps b) to d) using the modified query as the current query, the repeating being performed until a predefined stopping criterion is fulfilled.
    Type: Grant
    Filed: April 3, 2020
    Date of Patent: January 16, 2024
    Assignee: International Business Machines Corporation
    Inventors: Ivan Girardi, Harold Douglas Dykeman, Andrea Giovannini, Adam Ivankay, Chiara Marchiori, Kevin Thandiackal, Mario Zusag
  • Publication number: 20230401479
    Abstract: Computer-implemented methods are provided for generating machine learning model for multimodal data inference tasks. Such a method includes, for each sample in a training dataset of multimodal data samples, encoding the sample to produce a compressed vector representation of the sample in a k-dimensional latent space, and perturbing features of the sample to identify, for each dimension of the latent space, a set of active features perturbation of each of which produces more than a threshold change in the vector representation in that dimension. The method further comprises generating a sample graph having nodes interconnected by edges, wherein the nodes comprise nodes representing respective said features of the sample and edges interconnecting nodes indicate the active features for each dimension. The sample graph is then used to train a graph neural network model to perform the multimodal data inference task. Multimodal data inference systems employing such models are also provided.
    Type: Application
    Filed: June 13, 2022
    Publication date: December 14, 2023
    Inventors: Andrea Giovannini, Antonio Foncubierta Rodriguez, Niharika DSouza, Tanveer Syeda-Mahmood, HONGZHI WANG
  • Publication number: 20230376829
    Abstract: A processor may gather raw data comprising a plurality of characteristic data samples of a target user group. The processor may categorize the characteristic data samples into a plurality of user-related classes and triggers. The processor may build an input property graph for each characteristic data sample. The processor may augment the input property graph by a concept of hierarchies. The processor may determine a modification vector from the augmented input property graph. The processor may train an encoder/decoder combination machine-learning system. An embedding vector and a modification vector are used as input for the decoder to build a trained machine-learning generative model.
    Type: Application
    Filed: May 20, 2022
    Publication date: November 23, 2023
    Inventors: Andrea Giovannini, Frederik Frank Flöther, Patrick Lustenberger, David Ocheltree
  • Publication number: 20230325840
    Abstract: A computer-implemented method for enabling transaction-risk evaluation by resource-limited devices. The method includes receiving from a financial network transaction data, defining transactions in the network, and generating, based on the transaction data, a transaction graph comprising nodes, representing parties to transactions, interconnected by edges representing transactions between parties represented by the nodes. For each of at least some nodes, at least one risk attribute provided in the transaction graph. The method includes receiving from a resource-limited device a request describing a potential transaction, identifying at least one counterparty node, deriving transaction-risk data, dependent on aggregated risk attributes of the counterparty node and a selected set of nodes reachable from that node via edges, and sending to the device a response comprising the transaction-risk data for evaluation of risk of the potential transaction.
    Type: Application
    Filed: April 8, 2022
    Publication date: October 12, 2023
    Inventors: Tamas Visegrady, Andrea Giovannini
  • Publication number: 20230252268
    Abstract: An approach for predicting a state of a test entity may be provided. The approach may include providing a test graph, corresponding to the test entity, and a conditional generative model, based on a graph neural network. The test graph may have a hybrid structure, which may be a static graph and a dynamic graph. The static graph may include a reference vertex associated with an entity. The reference vertex can be connected to peripheral vertices associated with permanent attributes of the entity. The dynamic graph may be connected to the reference vertex and include chronological vertices associated with transient attributes. The chronological vertices are chronologically ordered via oriented chronological edges. The approach may predict a next chronological state of the test graph based on applying the test graph to the conditional generative model.
    Type: Application
    Filed: February 7, 2022
    Publication date: August 10, 2023
    Inventors: Andrea Giovannini, Matteo Manica