Patents by Inventor Roy Jevnisek

Roy Jevnisek has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11574500
    Abstract: Embodiments of the present disclosure enable and accurate detection of facial landmarks on mobile devices in real-time. An architecture of a facial landmark detection model is provided including one or more of an attention mechanism (e.g., an attention network), a graph convolution model (e.g., a two-dimensional facial geometry graph convolution model), a multiscale coarse-to-fine mechanism, a patch-facial landmark detachment mechanism, and error estimation techniques. The attention mechanism may increase the accuracy of the facial landmark detection model by attending to meaningful patches. The graph convolution network may improve patch feature aggregation by considering the facial landmarks' geometry. The coarse-to-fine mechanism reduces a network convergence to two cycles (e.g., two facial landmark detection iterations). A patch-facial landmark detachment mechanism reduces the computation burden without significant accuracy degradation.
    Type: Grant
    Filed: January 18, 2021
    Date of Patent: February 7, 2023
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Gil Shapira, Noga Levy, Roy Jevnisek, Ishay Goldin
  • Publication number: 20220147680
    Abstract: Methods, systems, and apparatus for combined or separate implementation of coarse-to-fine neural architecture search (NAS), two-phase block NAS, variable hardware prediction, and differential hardware design are provided and described. A variable predictor is trained, as described herein. Then, a controller or policy may be used to iteratively modify a neural network architecture along dimensions formed by neural network architecture parameters. The modification is applied to blocks (e.g., subnetworks) within the neural network architecture. In each iteration, the remainder of the neural network architecture parameters are modified and learned with a differential NAS method. The training process is performed with two-phase block NAS and incorporates a variable hardware predictor to predict power, performance, and area (PPA) parameters. The hardware parameters may be learned as well using the variable hardware predictor.
    Type: Application
    Filed: November 12, 2020
    Publication date: May 12, 2022
    Inventors: NIV ZEHNGUT, AMIR BEN-DROR, EVGENY ARTYOMOV, MICHAEL DINERSTEIN, ROY JEVNISEK
  • Publication number: 20220075994
    Abstract: Embodiments of the present disclosure enable and accurate detection of facial landmarks on mobile devices in real-time. An architecture of a facial landmark detection model is provided including one or more of an attention mechanism (e.g., an attention network), a graph convolution model (e.g., a two-dimensional facial geometry graph convolution model), a multiscale coarse-to-fine mechanism, a patch-facial landmark detachment mechanism, and error estimation techniques. The attention mechanism may increase the accuracy of the facial landmark detection model by attending to meaningful patches. The graph convolution network may improve patch feature aggregation by considering the facial landmarks' geometry. The coarse-to-fine mechanism reduces a network convergence to two cycles (e.g., two facial landmark detection iterations). A patch-facial landmark detachment mechanism reduces the computation burden without significant accuracy degradation.
    Type: Application
    Filed: January 18, 2021
    Publication date: March 10, 2022
    Inventors: GIL SHAPIRA, Noga Levy, Roy Jevnisek, Ishay Goldin
  • Publication number: 20170193230
    Abstract: Disclosed herein is a system and method for determining whether two files are similar or an unknown file contains malware or other malicious activity. The system takes a suspect file and generates a hash for the file. The hash represents segments of a file that may be compared with segments of other hashes. This hash is then compared with the hash of another file. The comparison measures the distance between the two hashes and if the two hashes are close enough to each other then the two files are consider similar to each other.
    Type: Application
    Filed: May 3, 2015
    Publication date: July 6, 2017
    Inventors: Roy Jevnisek, Tomer Brand, Patrick Estavillo, Marian Radu