Patents by Inventor Sameep Mehta

Sameep Mehta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200364235
    Abstract: One embodiment provides a method, including: receiving, from a user, (i) a dataset and (ii) an intended output from the dataset that is generated in view of a given analytical framework for the dataset, wherein the intended output identifies an output that the user wants from the dataset and wherein the dataset is related to an analytical domain; identifying a plurality of dataset functions related to the analytical domain; determining one or more dataset functions for each of one or more operations identified, wherein the one or more operations are identified using the repository to identify operations used to result in an intended output similar to the received intended output; and recommending an ordered subset of the one or more dataset functions to be used to transform the dataset to the intended output, wherein the ordered subset comprises (i) one dataset function for each of the one or more operations and (ii) an order for performing the one or more operations.
    Type: Application
    Filed: May 14, 2019
    Publication date: November 19, 2020
    Inventors: Kalapriya Kannan, Sameep Mehta
  • Patent number: 10824721
    Abstract: One embodiment provides a method for delaying malicious attacks on machine learning models that a trained using input captured from a plurality of users, including: deploying a model, said model designed to be used with an application, for responding to requests received from users, wherein the model comprises a machine learning model that has been previously trained using a data set; receiving input from one or more users; determining, using a malicious input detection technique, if the received input comprises malicious input; if the received input comprises malicious input, removing the malicious input from the input to be used to retrain the model; retraining the model using received input that is determined to not be malicious input; and providing, using the retrained model, a response to a received user query, the retrained model delaying the effect of malicious input on provided responses by removing malicious input from retraining input.
    Type: Grant
    Filed: May 22, 2018
    Date of Patent: November 3, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Manish Kesarwani, Atul Kumar, Vijay Arya, Rakesh R. Pimplikar, Sameep Mehta
  • Patent number: 10824755
    Abstract: One embodiment provides a method, including: receiving, at a third-party storage provider and from a data owner, a plurality of encrypted documents, wherein each of the plurality of encrypted documents is encrypted by the data owner using at least one encryption key; receiving, from a query user, an encrypted query, wherein the query is encrypted using the at least one encryption key; computing an edit distance value between the encrypted query and at least a portion of the plurality of encrypted documents, wherein the computing comprises communicating with an entity to work together to compute the edit distance value; the communicating comprising (i) providing, from the third-party storage provider to the entity, an encrypted function of an edit distance matrix and (ii) receiving an encrypted edit distance value computed by the entity from the encrypted function; and returning the encrypted edit distance value to the query user.
    Type: Grant
    Filed: October 11, 2018
    Date of Patent: November 3, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Akshar Kaul, Sameep Mehta, Shashank Srivastava
  • Publication number: 20200327424
    Abstract: One embodiment provides a method, including: receiving a target unstructured document for determining whether the target unstructured document comprises biased information; identifying an objective of the target unstructured document by extracting, from the target unstructured document, (i) entities and (ii) relationships between the entities; creating a structured knowledge base, wherein the creating comprises (i) creating an entry in the structured knowledge base corresponding to the target unstructured document, (ii) identifying other unstructured documents having a similarity to the target unstructured document, and (iii) generating an entry in the structured knowledge base corresponding to each of the other unstructured documents; applying a bias detection technique on the structured knowledge base; and providing an indication of whether the target unstructured document comprises bias.
    Type: Application
    Filed: April 15, 2019
    Publication date: October 15, 2020
    Inventors: Pranay Kumar Lohia, Rajmohan Chandrahasan, Himanshu Gupta, Samiulla Zakir Hussain Shaikh, Sameep Mehta, Atul Kumar
  • Publication number: 20200302005
    Abstract: An article is automatically augmented. The article and one or more comments are received. Comment elements are extracted from the one or more comments, and article elements are extracted from the article. Alignment scores are generated for comment-article pairs based on the extracted comment and article elements. Further, it is determined that at least one comment-article pair has an alignment score at or above a threshold alignment score. At least one augmentation feature is then generated.
    Type: Application
    Filed: March 22, 2019
    Publication date: September 24, 2020
    Inventors: Manish Anand Bhide, Nishtha Madaan, Seema Nagar, Sameep Mehta, Kuntal Dey
  • Publication number: 20200302006
    Abstract: An article is automatically augmented. The article and one or more comments are received. Comment elements are extracted from the one or more comments, and article elements are extracted from the article. Alignment scores are generated for comment-article pairs based on the extracted comment and article elements. Further, it is determined that at least one comment-article pair has an alignment score at or above a threshold alignment score. At least one augmentation feature is then generated.
    Type: Application
    Filed: July 15, 2019
    Publication date: September 24, 2020
    Inventors: Manish Anand Bhide, Nishtha Madaan, Seema Nagar, Sameep Mehta, Kuntal Dey
  • Patent number: 10783161
    Abstract: A method includes determining, by a controller, a portion of data that is selected by a user. The portion of data includes source data that is to be transformed by at least one shaping function. The method also includes generating, by the controller, a first output recommendation data that communicates at least one recommended shaping function to apply to the portion of data. The first output recommendation data is generated based on patterns of shaping functions that have been previously chosen. The patterns of shaping functions that have been previously chosen can be chosen by a plurality of system users. The method also includes determining whether to apply the at least one recommended shaping function to the portion of data. The method also includes applying the at least one recommended shaping function based on the determining.
    Type: Grant
    Filed: December 15, 2017
    Date of Patent: September 22, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Manish Bhide, Shabharesh Gudla, Sameep Mehta, Prishni Rateria, Samiulla Shaikh, Neelesh K. Shukla, Paul S. Taylor
  • Patent number: 10742401
    Abstract: One embodiment provides a method, including: receiving, from a data owner, an input string of plaintext data comprising a plurality of characters for storage in a database of a third-party storage provider; arranging the plurality of characters of the input string as a half pyramid, wherein the half pyramid comprises a plurality of rows, each row comprising at least one more character than a preceding row; encrypting, using a secure encryption scheme and based upon a key, each row of the half pyramid independently from each other row of the half pyramid; and storing, in the database of the third-party storage provider, the encrypted rows of the half pyramid. Other aspects are claimed and described.
    Type: Grant
    Filed: December 19, 2017
    Date of Patent: August 11, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Akshar Kaul, Manish Kesarwani, Sameep Mehta, Prasad G. Naldurg, Gagandeep Singh
  • Patent number: 10740209
    Abstract: Methods, systems, and computer program products for tracking missing data using provenance traces and data simulation are provided herein. A computer-implemented method includes generating, for each of multiple stages in a data curation sequence, a machine learning model of the data curation sequence, wherein the model is based on historical input records within the data curation sequence, historical output records within the data curation sequence, and provenance data within the data curation sequence; creating a simulated output record based on a detected anomaly corresponding to the data curation sequence; predicting the content of absent input records that precede the simulated output record in the data curation sequence and provenance data corresponding to the simulated output record; and outputting, to a user, in response to a query pertaining to the detected anomaly, the predicted input records and information relating the predicted input records to the detected anomaly.
    Type: Grant
    Filed: August 20, 2018
    Date of Patent: August 11, 2020
    Assignee: International Business Machines Corporation
    Inventors: Salil Joshi, Hima Prasad Karanam, Manish Kesarwani, Sameep Mehta
  • Publication number: 20200250264
    Abstract: Embodiments provide a computer implemented method in a data processing system comprising a processor and a memory comprising instructions, which are executed by the processor to cause the processor to implement the method of removing a cognitive terminology from a news article at a news portal, the method including: receiving, by the processor, a first news article from a user; configuring, by the processor, a cognitive terminology filter list to add one or more entities and one or more cognitive terminology types associated with each entity in the cognitive terminology filter list; dividing, by the processor, the first news article into a plurality of text segments; identifying, by the processor, one or more key entities and one or more inter-entity relationships of each text segment; detecting, by the processor, one or more cognitive terminologies in the first news article; and providing, by the processor, one or more suggestions to remove the one or more cognitive terminologies.
    Type: Application
    Filed: January 31, 2019
    Publication date: August 6, 2020
    Inventors: Manish A. Bhide, Sameep Mehta, Nishtha Madaan, Kuntal Dey
  • Patent number: 10733287
    Abstract: One embodiment provides a method, including: deploying a machine learning model, wherein the deployed machine learning model is used in responding to queries from users; receiving, at the deployed machine learning model, input from a user; identifying a type of machine learning model attack corresponding to the received input; computing, responsive to receiving the input, a resiliency score of the machine learning model, wherein the resiliency score indicates resistance of the machine learning model against the identified type of attack; and performing an action responsive to the computed resiliency score.
    Type: Grant
    Filed: May 14, 2018
    Date of Patent: August 4, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Manish Kesarwani, Suranjana Samanta, Deepak Vijaykeerthy, Sameep Mehta, Karthik Sankaranarayanan
  • Patent number: 10732883
    Abstract: One embodiment provides a method, including: receiving, from an application, information for storage in a storage management system, wherein the storage management system comprises a plurality of storage layers, each storage layer having a different performance and a different cost than the other storage layers; labeling the information with one of a plurality of labels relevant to the application; assigning the information a performance tolerance value based upon the label of the information, wherein the performance tolerance value comprises an estimate of the performance requirement required by the application storing the information; determining a storage layer for storage of the information, wherein the determining comprises identifying one of the plurality of storage layers corresponding to the label of the information and updating metadata of a logical volume corresponding to the information with the performance tolerance value; and sending the information to the determined storage layer.
    Type: Grant
    Filed: January 28, 2019
    Date of Patent: August 4, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Krishnasuri Narayanam, Shashank Mujumdar, Sameep Mehta, Deepak Vijaykeerthy
  • Publication number: 20200241788
    Abstract: One embodiment provides a method, including: receiving, from an application, information for storage in a storage management system, wherein the storage management system comprises a plurality of storage layers, each storage layer having a different performance and a different cost than the other storage layers; labeling the information with one of a plurality of labels relevant to the application; assigning the information a performance tolerance value based upon the label of the information, wherein the performance tolerance value comprises an estimate of the performance requirement required by the application storing the information; determining a storage layer for storage of the information, wherein the determining comprises identifying one of the plurality of storage layers corresponding to the label of the information and updating metadata of a logical volume corresponding to the information with the performance tolerance value; and sending the information to the determined storage layer.
    Type: Application
    Filed: January 28, 2019
    Publication date: July 30, 2020
    Inventors: Krishnasuri Narayanam, Shashank Mujumdar, Sameep Mehta, Deepak Vijaykeerthy
  • Publication number: 20200234184
    Abstract: One embodiment provides a method, including: deploying a machine learning model, wherein the machine learning model is used in responding to queries from users; receiving, at the deployed machine learning model, input from at least one entity; determining that the at least one entity is an adversary attempting to retrain and/or steal the deployed machine learning model; and providing, in view of the determining that the at least one entity is an adversary, an altered response, wherein the altered response comprises at least one of: a response from a machine learning model other than the deployed machine learning model and a response from the deployed machine learning model altered with errors.
    Type: Application
    Filed: January 23, 2019
    Publication date: July 23, 2020
    Inventors: Manish Kesarwani, Deepak Vijaykeerthy, Sameep Mehta, Suranjana Samanta, Karthik Sankaranarayanan
  • Publication number: 20200233910
    Abstract: An apparatus for dynamically debiasing an online job application system includes a processor and a memory that stores code executable by the processor to receive a plurality of job listings and corresponding job descriptions in response to a search query on an online job listing system and to dynamically modify bias terms of the job description for each of the job listings based on profile information for a user such that each of the job descriptions conforms to the user's profile information. The apparatus includes code executable by the processor to dynamically rank each of the job listings based on the modified job descriptions and with respect to the user's profile information and the search query and to present the job listings and their corresponding modified job descriptions in order of the rank for each of the job listings.
    Type: Application
    Filed: January 21, 2019
    Publication date: July 23, 2020
    Inventors: Manish Bhide, Seema Nagar, Sameep Mehta, Kuntal Dey
  • Publication number: 20200213644
    Abstract: One embodiment provides a method, including: obtaining at least one video into which an advertisement is to be inserted; selecting an advertisement for insertion into the at least one video, wherein the selecting comprises (i) analyzing the at least one video to identify context of the at least one video and (ii) selecting an advertisement that is related to the context of the at least one video; determining a location within the at least one video for insertion of the advertisement, wherein the determining a location comprises (i) identifying criticality of a scene within the video where the advertisement is to be inserted and (ii) selecting the location based upon the criticality of the scene; and inserting the advertisement within the at least one video at the determined location.
    Type: Application
    Filed: January 2, 2019
    Publication date: July 2, 2020
    Inventors: Nitin Gupta, Shashank Mujumdar, Sameep Mehta
  • Patent number: 10700864
    Abstract: Techniques facilitating autonomously rendering an encrypted data anonymous in a non-trusted environment are provided. In one example, a computer-implemented method can comprise generating, by a system operatively coupled to a processor, a plurality of clusters of encrypted data from an encrypted dataset using a machine learning algorithm. The computer-implemented method can also comprise modifying, by the system, the plurality of clusters based on a defined criterion that can facilitate anonymity of the encrypted data.
    Type: Grant
    Filed: July 12, 2017
    Date of Patent: June 30, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Spyridon Antonatos, Stefano Braghin, Akshar Kaul, Manish Kesarwani, Sameep Mehta
  • Patent number: 10700866
    Abstract: Techniques facilitating autonomously rendering an encrypted data anonymous in a non-trusted environment are provided. In one example, a computer-implemented method can comprise generating, by a system operatively coupled to a processor, a plurality of clusters of encrypted data from an encrypted dataset using a machine learning algorithm. The computer-implemented method can also comprise modifying, by the system, the plurality of clusters based on a defined criterion that can facilitate anonymity of the encrypted data.
    Type: Grant
    Filed: December 14, 2017
    Date of Patent: June 30, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Spyridon Antonatos, Stefano Braghin, Akshar Kaul, Manish Kesarwani, Sameep Mehta
  • Patent number: 10693628
    Abstract: Methods, systems, and computer program products for enabling distance-based algorithms on data encrypted using a 2DNF homomorphic encryption scheme with inefficient decryption are provided herein. A computer-implemented method includes generating multiple versions of a data point, wherein each of the multiple versions of the data point comprises a distinct value corresponding to a distinct Euclidean space; encrypting each of the multiple versions of the data point; storing the multiple encrypted versions of the data point across multiple databases; and executing one or more distance-based algorithms on the multiple encrypted versions of the data point by using a finite decryption table across the multiple databases, wherein the finite decryption table stores a set of plaintext-ciphertext mappings between (i) multiple plaintext values and (ii) multiple encrypted ciphertext values corresponding to the multiple plaintext values.
    Type: Grant
    Filed: May 4, 2018
    Date of Patent: June 23, 2020
    Assignee: International Business Machines Corporation
    Inventors: Gagandeep Singh, Akshar Kaul, Manish Kesarwani, Sameep Mehta
  • Publication number: 20200193303
    Abstract: A method, a system, and a computer program product are provided for analyzing an instructional video. Video data of an instructional video is analyzed to form multiple units of work. Each unit of work is a respective grouping of video frames of the instructional video based on a respective logical combination of activities associated therewith. Each unit of work is analyzed to produce a respective action graph of activities included in the unit of work, the respective action graph indicating interdependencies among the activities included therein. Interdependencies among activities across the units of work are determined to form a critical path graph. A received query is processed to provide troubleshooting assistance with respect to the instructional video based on the units of work, the action graphs, the critical path graph, and a knowledge base including information related to a subject matter of the instructional video.
    Type: Application
    Filed: December 14, 2018
    Publication date: June 18, 2020
    Inventors: Abhishek Mitra, Nitin Gupta, Shashank Mujumdar, Sameep Mehta