Patents by Inventor Killian Levacher
Killian Levacher has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12182263Abstract: Adversarial attack detection operations may be applied on one or more deep generative models for defending deep generative models from adversarial attacks. The adversarial attack may be detected on the one or more deep generative models based on the one or more of a plurality of adversarial attack detection operations. The one or more deep generative models may be sanitized based on the adversarial attack.Type: GrantFiled: December 13, 2021Date of Patent: December 31, 2024Assignee: International Business Machines CorporationInventors: Mathieu Sinn, Killian Levacher, Ambrish Rawat
-
Publication number: 20240250984Abstract: Protection against prying devices on a computer network is provided. The method comprises identifying a number of prying devices connected to the computer network, wherein the prying devices have the capability to record audio and/or video data, and wherein the prying devices have the potential to eavesdrop on an audio/video conference call. Responsive to detecting initiation of the audio/video conference call, the prying devices are prevented from communicating over the computer network. Responsive to detecting termination of the audio/video conference call, the prying devices are allowed to resume communication over the computer network.Type: ApplicationFiled: January 20, 2023Publication date: July 25, 2024Inventors: Marco Simioni, Stefano Braghin, Mark Purcell, Killian Levacher
-
Publication number: 20240193428Abstract: A method, computer system, and computer program product are provided for training a federated generative adversarial network (GAN) using private data. The method is carried out at an aggregator system having a generator and a discriminator, wherein the aggregator system is in communication with multiple participant systems each having a local feature extractor and a local discriminator. The method includes: receiving, from a feature extractor at a participant system, a set of features for input to the discriminator at the aggregator system, wherein the features include features extracted from private data that is private to the participant system; and receiving, from one or more local discriminators of the participant systems, discriminator parameter updates to update the discriminator at the aggregator system, wherein the local discriminators are trained at the participant systems.Type: ApplicationFiled: December 9, 2022Publication date: June 13, 2024Inventors: Ambrish Rawat, Killian Levacher, Giulio Zizzo, Ngoc Minh Tran
-
Publication number: 20240104806Abstract: A system may receive inputs including a media, a targeted object keyword list, and a command. The system may feed expanded targeted object keywords into an object detector selector. The system may determine a target object area in the media, by the object detector selector using one or more object detector models. The system may feed the media, and the target object area into an area filler module. The system may generate a background, the area filler module in a target object area of the media.Type: ApplicationFiled: September 26, 2022Publication date: March 28, 2024Inventors: Stefano Braghin, Killian Levacher, Hessel Tuinhof, Marco Simioni
-
Publication number: 20230418859Abstract: A method, computer system, and a computer program product for data processing, comprising obtaining a plurality of files from a data source. These files are analyzed the files for information about the content and in order to determine structural information of each file. Once the files have been analyzed, information in each file may be sorted and categorized by common content. Sensitive information may also be extracted and categorized separately. Information may then be then merged using the categories to create a single unified file.Type: ApplicationFiled: June 27, 2022Publication date: December 28, 2023Inventors: Youngja Park, MOHAMMED FAHD ALHAMID, Stefano Braghin, Jing Xin Duan, Mokhtar Kandil, Michael Vu Le, Killian Levacher, Micha Gideon Moffie, Ian Michael Molloy, Walid Rjaibi, ARIEL FARKASH
-
Publication number: 20230419934Abstract: Predetermined musical data for a song is received. The predetermined musical data includes chords and lyrics and rhythmic structures of the song. Audio data of a band generating music of the song is received. Generating real-time vocal audio that is in rhythm with the audio data and in harmony with the chords. The vocal audio includes the lyrics and is of a predetermined voice.Type: ApplicationFiled: June 27, 2022Publication date: December 28, 2023Inventors: Killian Levacher, Stefano Braghin, Marco Simioni, Ambrish Rawat
-
Patent number: 11842256Abstract: Embodiments for ensemble training in a distributed marketplace in a computing environment. One or more ensemble machine learning models may be provided from a plurality of machine learning models competing within the distributed marketplace that achieve a performance on ensemble training data equal to or greater than a selected performance threshold, wherein the distributed marketplace is a blockchain.Type: GrantFiled: May 15, 2020Date of Patent: December 12, 2023Assignee: International Business Machines Corporation ArmonkInventors: Killian Levacher, Emanuele Ragnoli, Stefano Braghin, Gokhan Sagirlar
-
Publication number: 20230394298Abstract: A system may include a memory and a processor in communication with the memory. The processor may be configured to perform operations. The operations may include procuring a model and obtaining hyperparameters for watermarking the model. The operations may include embedding a watermark in the model using the hyperparameters to achieve a watermarked model and delivering the watermarked model and a watermark verification mechanism to a user.Type: ApplicationFiled: June 3, 2022Publication date: December 7, 2023Inventors: Ambrish Rawat, Killian Levacher, Beat Buesser, Rahul Nair
-
Patent number: 11824894Abstract: Embodiments of the invention are directed to techniques that include receiving a query intended for a targeted database and determining that the query is from an unauthorized user. A response is returned to the unauthorized user generated by a model, the response being dynamically generated to fulfill the query. The model is configured to generate responses consistent with any previous responses returned to the unauthorized user.Type: GrantFiled: November 25, 2020Date of Patent: November 21, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Marco Simioni, Stefano Braghin, Killian Levacher
-
Publication number: 20230306118Abstract: A method, computer program, and computer system are provided for predicting and assessing risks on websites. Data corresponding to historical interactions of a user with one or more websites is accessed. A simulation of actions of the user is generated based on the accessed data, and actions of the user are simulated on a pre-defined target website based on the generated simulation of the actions of the user. Risks on the target website are identified based on simulating the actions of the user. The website is updated to mitigate the identified risks.Type: ApplicationFiled: March 22, 2022Publication date: September 28, 2023Inventors: Ambrish Rawat, Stefano Braghin, Killian Levacher, Ngoc Minh Tran, Giulio Zizzo
-
Publication number: 20230289573Abstract: A computer-implemented method, a computer program product, and a computer system for assessing fairness of a deep generative model. A computer system receives a user defined fairness criterion for the deep generative model. A computer system probes the deep generative model to produce samples for a target output. A computer system evaluates the samples for the fairness of the deep generative model, according to the user defined fairness criterion. A computer system produces a set of recommendations for modifying the deep generative model to meet the user defined fairness criterion, in response to determining that the deep generative model does not meet the user defined fairness criterion. In response to determining that the deep generative model is to be modified, a computer system applies at least one subset of the recommendations to the deep generative model. A computer system updates the deep generative model.Type: ApplicationFiled: March 9, 2022Publication date: September 14, 2023Inventors: Ambrish Rawat, Jonathan Peter Epperlein, Rahul Nair, Killian Levacher
-
Publication number: 20230208761Abstract: One or more systems, devices, computer program products and/or computer-implemented methods of use provided herein relate to facilitating a process to compensate a service being provided over a network connection. A system can comprise a memory that stores computer executable components, and a processor that executes the computer executable components stored in the memory, wherein the computer executable components can comprise a determination component that determines a network connection between a server and a client node, and a predictive component that predicts, employing machine learning, a graphical representation update to a service provided by the server over the network connection. The predictive component can generate the prediction in response to a decrease in bandwidth and/or an increase in latency of a network connection. A training component can train a machine learning model employed by the predictive component based on historical data of the service provided by the server.Type: ApplicationFiled: December 28, 2021Publication date: June 29, 2023Inventors: Marco Simioni, Ambrish Rawat, Killian Levacher, Mark Purcell
-
Publication number: 20230185912Abstract: Adversarial attack detection operations may be applied on one or more deep generative models for defending deep generative models from adversarial attacks. The adversarial attack may be detected on the one or more deep generative models based on the one or more of a plurality of adversarial attack detection operations. The one or more deep generative models may be sanitized based on the adversarial attack.Type: ApplicationFiled: December 13, 2021Publication date: June 15, 2023Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mathieu SINN, Killian LEVACHER, Ambrish RAWAT
-
Patent number: 11562139Abstract: A method, computer system, and a computer program product for text data protection is provided. The present invention may include receiving a text data. The present invention may also include identifying a portion of the received text data having a highest impact on a first confidence score associated with a target model prediction. The present invention may further include generating at least one semantically equivalent text relative to the identified portion of the received text data. The present invention may also include determining that the generated at least one semantically equivalent text produces a second confidence score associated with the target model prediction that is less than the first confidence score associated with the target model prediction. The present invention may further include generating a prompt to suggest modifying the identified portion of the received text data using the generated at least one semantically equivalent text.Type: GrantFiled: November 23, 2020Date of Patent: January 24, 2023Assignee: International Business Machines CorporationInventors: Ngoc Minh Tran, Killian Levacher, Beat Buesser, Mathieu Sinn
-
Patent number: 11562087Abstract: Systems, computer-implemented methods, and computer program products that can facilitate sensitive data policy recommendation are provided. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise an extraction component that can employ an artificial intelligence model to extract compliance data from a data source. The computer executable components can further comprise a recommendation component that can recommend a sensitive data policy based on the compliance data. In some embodiments, the recommendation component can further identify one or more sensitive data entities of a sensitive data dataset that are affected by actionable obligation data of the data source.Type: GrantFiled: March 14, 2019Date of Patent: January 24, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Spyridon Antonatos, Stefano Braghin, Naoise Holohan, Killian Levacher, Rahul Nair, Martin Stephenson
-
Patent number: 11556938Abstract: Various embodiments are provided for managing regulatory compliance for an entity in a computing environment by a processor. A law, policy, regulation, or a combination thereof extracted from one or more segments of text data from one or more data sources may be identified requiring an obligation to be performed by the entity.Type: GrantFiled: January 7, 2019Date of Patent: January 17, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rahul Nair, Killian Levacher, Martin Stephenson
-
Patent number: 11392487Abstract: Embodiments include a method for one or more processors to receive an organic dataset and a domain knowledge base. The one or more processors identify private data entities present within the organic dataset. The one or more processors determine statistical properties of the private data entities identified within the organic dataset. The one or more processors create a plurality of test data templates by removing the private data entities from the organic dataset. The one or more processors select from the domain knowledge base, synthetic data entities that match a data type of the removed private data entities, respectively, and align with the statistical properties of the private data entities, and the one or more processors generate synthetic test data by inserting, respectively, the synthetic data entities of the matching data type for the removed private data entities in the test data templates.Type: GrantFiled: November 16, 2020Date of Patent: July 19, 2022Assignee: International Business Machines CorporationInventors: Killian Levacher, Stefano Braghin, Naoise Holohan
-
Publication number: 20220188690Abstract: A computer-implemented method includes receiving at a threat detection system monitoring data in real-time from online activity in a network, the threat detection system including a machine learning model, and analyzing the monitoring data via the machine learning model to identify one or more anomalies in the monitoring data associated with a security threat to the network, the machine learning model trained to have one or more learning parameters. The method also includes receiving a subset of the monitoring data at a meta-learning module, storing the subset as time-based historical data, inputting the historical data at a meta-learning model, calculating an update policy prescribing a change to the one or more learning parameters based on the historical data, and applying the update policy to the machine learning model.Type: ApplicationFiled: December 11, 2020Publication date: June 16, 2022Inventors: Ambrish Rawat, Hessel Tuinhof, Killian Levacher, Stefano Braghin
-
Patent number: 11361055Abstract: Methods, systems and computer program products for protection of content repositories using dynamic watermarking are provided. Aspects include receiving a request for a code stored in a content repository from a user and identifying a plurality of candidate locations in the code to insert watermarks. Aspects also include generating one or more watermarks and inserting the one or more watermarks in a subset of the plurality of candidate locations in the code. Aspects further include providing the code, including the one or more watermarks, to the user.Type: GrantFiled: December 4, 2020Date of Patent: June 14, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Killian Levacher, Beat Buesser, Marco Simioni
-
Publication number: 20220179931Abstract: Methods, systems and computer program products for protection of content repositories using dynamic watermarking are provided. Aspects include receiving a request for a code stored in a content repository from a user and identifying a plurality of candidate locations in the code to insert watermarks. Aspects also include generating one or more watermarks and inserting the one or more watermarks in a subset of the plurality of candidate locations in the code. Aspects further include providing the code, including the one or more watermarks, to the user.Type: ApplicationFiled: December 4, 2020Publication date: June 9, 2022Inventors: KILLIAN LEVACHER, BEAT BUESSER, MARCO SIMIONI