Patents by Inventor Sameep Mehta

Sameep Mehta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10521359
    Abstract: Methods, systems, and computer program products for secure distance computations are provided herein.
    Type: Grant
    Filed: May 8, 2017
    Date of Patent: December 31, 2019
    Assignee: International Business Machines Corporation
    Inventors: Gagandeep Singh, Akshar Kaul, Manish Kesarwani, Prasad Naldurg, Sameep Mehta
  • Publication number: 20190362072
    Abstract: One embodiment provides a method for delaying malicious attacks on machine learning models that a trained using input captured from a plurality of users, including: deploying a model, said model designed to be used with an application, for responding to requests received from users, wherein the model comprises a machine learning model that has been previously trained using a data set; receiving input from one or more users; determining, using a malicious input detection technique, if the received input comprises malicious input; if the received input comprises malicious input, removing the malicious input from the input to be used to retrain the model; retraining the model using received input that is determined to not be malicious input; and providing, using the retrained model, a response to a received user query, the retrained model delaying the effect of malicious input on provided responses by removing malicious input from retraining input.
    Type: Application
    Filed: May 22, 2018
    Publication date: November 28, 2019
    Inventors: Manish Kesarwani, Atul Kumar, Vijay Arya, Rakesh R. Pimplikar, Sameep Mehta
  • Publication number: 20190354687
    Abstract: Methods, systems, and computer program products for providing the status of model extraction in the presence of colluding users are provided herein. A computer-implemented method includes generating, for each of multiple users, a summary of user input to a machine learning model; comparing the generated summaries to boundaries of multiple feature classes within an input space of the machine learning model; computing correspondence metrics based at least in part on the comparisons; identifying, based at least in part on the computed metrics, one or more of the multiple users as candidates for extracting portions of the machine learning model in an adversarial manner; and generating and outputting an alert, based on the identified users, to an entity related to the machine learning model.
    Type: Application
    Filed: May 21, 2018
    Publication date: November 21, 2019
    Inventors: Manish Kesarwani, Vijay Arya, Sameep Mehta
  • Publication number: 20190355044
    Abstract: One embodiment provides a method, including: receiving, at a data service provider, a request from an information purchaser, wherein the request comprises (i) a budget identifying an amount of money to be spent on information and (ii) an objective function identifying a type of information that the information purchaser is requesting; accessing at least a subset of at least one information set of at least one information seller, wherein each of the at least one information sets comprises an information set available for purchase from the information seller; identifying whether at least one accessed information set that fulfills the received request; and providing, if at least one accessed information set fulfills the received request, a recommendation of an information set for purchase by the information purchaser, wherein the provided recommendation comprises at least one of the identified information sets that fulfills the received request.
    Type: Application
    Filed: May 16, 2018
    Publication date: November 21, 2019
    Inventors: Akshar Kaul, Manish Kesarwani, Gagandeep Singh, Sameep Mehta
  • Publication number: 20190347410
    Abstract: One embodiment provides a method, including: deploying a machine learning model, wherein the deployed machine learning model is used in responding to queries from users; receiving, at the deployed machine learning model, input from a user; identifying a type of machine learning model attack corresponding to the received input; computing, responsive to receiving the input, a resiliency score of the machine learning model, wherein the resiliency score indicates resistance of the machine learning model against the identified type of attack; and performing an action responsive to the computed resiliency score.
    Type: Application
    Filed: May 14, 2018
    Publication date: November 14, 2019
    Inventors: Manish Kesarwani, Suranjana Samanta, Deepak Vijaykeerthy, Sameep Mehta, Karthik Sankaranarayanan
  • Publication number: 20190342069
    Abstract: Methods, systems, and computer program products for enabling distance-based algorithms on data encrypted using a 2DNF homomorphic encryption scheme with inefficient decryption are provided herein. A computer-implemented method includes generating multiple versions of a data point, wherein each of the multiple versions of the data point comprises a distinct value corresponding to a distinct Euclidean space; encrypting each of the multiple versions of the data point; storing the multiple encrypted versions of the data point across multiple databases; and executing one or more distance-based algorithms on the multiple encrypted versions of the data point by using a finite decryption table across the multiple databases, wherein the finite decryption table stores a set of plaintext-ciphertext mappings between (i) multiple plaintext values and (ii) multiple encrypted ciphertext values corresponding to the multiple plaintext values.
    Type: Application
    Filed: May 4, 2018
    Publication date: November 7, 2019
    Inventors: Gagandeep Singh, Akshar Kaul, Manish Kesarwani, Sameep Mehta
  • Publication number: 20190318118
    Abstract: One embodiment provides a method, including: receiving, at a third-party storage provider, (i) a plurality of encrypted documents and (ii) a plurality of encrypted vectors corresponding to the plurality of encrypted documents; receiving a request to search the plurality of encrypted documents using an encrypted query vector; identifying whether at least one encrypted document from the encrypted documents is determined to be similar to the plaintext document provided in the received request, wherein the determining a similarity comprises communicating, between the third-party storage provider and at least another third-party storage provider without communicating components that would allow the other third-party storage provider to derive information regarding the documents; and returning a plaintext version of a returned encrypted document determined to be similar to the plaintext document provided in the received request.
    Type: Application
    Filed: April 16, 2018
    Publication date: October 17, 2019
    Inventors: Krishnasuri Narayanam, Manish Kesarwani, Sameep Mehta
  • Patent number: 10423442
    Abstract: One embodiment provides a method, comprising: receiving a plurality of jobs for processing, wherein each of the plurality of jobs comprises a plurality of tasks and wherein at least one of the plurality of jobs is dependent on another of the plurality of jobs; receiving task dependencies between tasks of the at least one of the plurality of jobs and tasks of the another of the plurality of jobs, wherein the task dependencies identify dependent tasks from the tasks of the at least one of the plurality of jobs and dependee tasks from the tasks of the another of the plurality of jobs; scheduling the processing of the dependent tasks as being based upon only the completed processing of the dependee tasks; and performing job processing of the dependent tasks after processing of the dependee tasks irrespective of the overall job processing status of the another of the plurality of jobs.
    Type: Grant
    Filed: May 25, 2017
    Date of Patent: September 24, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Himanshu Gupta, Nitin Gupta, Sameep Mehta
  • Patent number: 10394788
    Abstract: Methods, systems, and computer program products for schema-free in-graph indexing are provided herein. A computer-implemented method includes creating multiple indexes directed to data within a knowledge graph; correlating two or more of the created indexes, thereby generating one or more multi-dimensional indexes; determining, based on a received query, one or more traversal paths within the data of the knowledge graph and the generated multi-dimensional indexes, wherein the traversal paths facilitate processing of the query; and outputting a response to the query based on the determined traversal paths.
    Type: Grant
    Filed: November 4, 2016
    Date of Patent: August 27, 2019
    Assignee: International Business Machines Corporation
    Inventors: Srikanta B. Jagannath, Sriram Lakshminarasimhan, Sameep Mehta, Sumit Neelam
  • Publication number: 20190258783
    Abstract: One embodiment provides a method, including: assigning a machine learning model signature to a machine learning model, wherein the machine learning model signature is generated using (i) data points and (ii) corresponding data labels from training data; receiving input comprising identification of a target machine learning model; acquiring a target signature for the target machine learning model by generating a signature for the target machine learning model using (i) data points from the assigned machine learning model signature and (ii) labels assigned to those data points by the target machine learning model; determining a stolen score by comparing the target signature to the machine learning model signature and identifying the number of data labels that match between the target signature and the machine learning model signature; and classifying the target machine learning model as stolen based upon the stolen score reaching a predetermined threshold.
    Type: Application
    Filed: February 21, 2018
    Publication date: August 22, 2019
    Inventors: Sameep Mehta, Rakesh R. Pimplikar, Karthik Sankaranarayanan
  • Patent number: 10339107
    Abstract: Methods, systems, and computer program products for multi-level colocation and analytical processing of spatial data on MapReduce are provided herein. A method includes correlating multiple items of spatial data and multiple items of attribute data within a file system to generate multiple blocks of correlated data; colocating each of the multiple blocks of correlated data on a given node within the file system based on a data block placement policy; and clustering multiple replicas generated for each of the multiple data blocks at multiple levels of spatial granularity within the file system.
    Type: Grant
    Filed: June 8, 2015
    Date of Patent: July 2, 2019
    Assignee: International Business Machines Corporation
    Inventors: Tanveer A. Faruquie, Himanshu Gupta, Sriram Lakshminarasimhan, Sameep Mehta, Stuart A. Siegel
  • Publication number: 20190188307
    Abstract: A method includes determining, by a controller, a portion of data that is selected by a user. The portion of data includes source data that is to be transformed by at least one shaping function. The method also includes generating, by the controller, a first output recommendation data that communicates at least one recommended shaping function to apply to the portion of data. The first output recommendation data is generated based on patterns of shaping functions that have been previously chosen. The patterns of shaping functions that have been previously chosen can be chosen by a plurality of system users. The method also includes determining whether to apply the at least one recommended shaping function to the portion of data. The method also includes applying the at least one recommended shaping function based on the determining.
    Type: Application
    Filed: December 15, 2017
    Publication date: June 20, 2019
    Inventors: Manish Bhide, Shabharesh Gudla, Sameep Mehta, Prishni Rateria, Samiulla Shaikh, Neelesh K. Shukla, Paul S. Taylor
  • Publication number: 20190190695
    Abstract: One embodiment provides a method, including: receiving, from a data owner, an input string of plaintext data comprising a plurality of characters for storage in a database of a third-party storage provider; arranging the plurality of characters of the input string as a half pyramid, wherein the half pyramid comprises a plurality of rows, each row comprising at least one more character than a preceding row; encrypting, using a secure encryption scheme and based upon a key, each row of the half pyramid independently from each other row of the half pyramid; and storing, in the database of the third-party storage provider, the encrypted rows of the half pyramid. Other aspects are claimed and described.
    Type: Application
    Filed: December 19, 2017
    Publication date: June 20, 2019
    Inventors: Akshar Kaul, Manish Kesarwani, Sameep Mehta, Prasad G. Naldurg, Gagandeep Singh
  • Publication number: 20190179689
    Abstract: Methods, systems and computer program products for root cause analysis using provenance data are provided herein. A computer-implemented method comprises computing a plurality of provenance paths for at least one of a plurality of data elements in a curation flow and a plurality of groups of data elements in the curation flow, analyzing the computed provenance paths to determine one or more errors in the curation flow, and outputting the one or more errors in the curation flow to at least one user. The analyzing comprises at least one of identifying which of the computed provenance paths are partial provenance paths, and identifying one or more output records associated with the curation flow, wherein the one or more output records comprise incorrectly curated data, and identifying the computed provenance paths that respectively correspond to the one or more output records comprising the incorrectly curated data.
    Type: Application
    Filed: December 12, 2017
    Publication date: June 13, 2019
    Inventors: Hima P. Karanan, Manish Kesarwani, Salil Joshi, Mohit Jain, Sameep Mehta
  • Publication number: 20190158269
    Abstract: A processor may receive plaintext data. The plaintext data may correspond to a query. The processor may identify a granularity of the plaintext data. The processor may compress the plaintext data using a binary search tree. The binary search tree may compress the plaintext data based on the granularity of the plaintext data. The processor may encrypt the plaintext data by randomizing the order in which the binary search tree stores the compression of the plaintext data. The stored order of the binary search tree may act as a private key. The processor may process the query over an encrypted cumulative compressed database.
    Type: Application
    Filed: November 20, 2017
    Publication date: May 23, 2019
    Inventors: Manish Kesarwani, Akshar Kaul, Sameep Mehta, Hong Min
  • Publication number: 20190155919
    Abstract: A processor-implemented method may generate one or more deduplication maps based on analyzing the data and one or more encryption keys. The method may perform deduplication of the data based on the one or more deduplication maps, where deduplication may convert the data into plain data blocks and deduplicated data blocks. The method may encrypt the plain data blocks and the deduplication data blocks and transfer the one or more deduplication maps, the encrypted plain data blocks, and the encrypted deduplicated data blocks to a server.
    Type: Application
    Filed: November 20, 2017
    Publication date: May 23, 2019
    Inventors: Akshar Kaul, Sameep Mehta, Krishnasuri Narayanam, Ramasuri Narayanam
  • Publication number: 20190155956
    Abstract: Methods, systems and computer program products for association rule mining of an encrypted database are provided herein. A computer-implemented method includes receiving, at a first cloud computing environment, encrypted transaction data that are encrypted using an encryption scheme which provides additive homomorphism, wherein the transaction data comprise a plurality of combinations of two or more elements of a set of elements, receiving, at the first cloud computing environment, encrypted query data that are encrypted using the encryption scheme, wherein the query data comprise at least one of an element and a combination of two or more elements of the set of elements which are the subject of a query seeking a determination of whether at least one of the element and the combination of two or more elements is frequent, and computing addition of the encrypted query data with the encrypted transaction data.
    Type: Application
    Filed: November 21, 2017
    Publication date: May 23, 2019
    Inventors: Manish Kesarwani, Krishnasuri Narayanam, Sameep Mehta
  • Publication number: 20190020475
    Abstract: Techniques facilitating autonomously rendering an encrypted data anonymous in a non-trusted environment are provided. In one example, a computer-implemented method can comprise generating, by a system operatively coupled to a processor, a plurality of clusters of encrypted data from an encrypted dataset using a machine learning algorithm. The computer-implemented method can also comprise modifying, by the system, the plurality of clusters based on a defined criterion that can facilitate anonymity of the encrypted data.
    Type: Application
    Filed: July 12, 2017
    Publication date: January 17, 2019
    Inventors: Spyridon Antonatos, Stefano Braghin, Akshar Kaul, Manish Kesarwani, Sameep Mehta
  • Publication number: 20190020477
    Abstract: Techniques facilitating autonomously rendering an encrypted data anonymous in a non-trusted environment are provided. In one example, a computer-implemented method can comprise generating, by a system operatively coupled to a processor, a plurality of clusters of encrypted data from an encrypted dataset using a machine learning algorithm. The computer-implemented method can also comprise modifying, by the system, the plurality of clusters based on a defined criterion that can facilitate anonymity of the encrypted data.
    Type: Application
    Filed: December 14, 2017
    Publication date: January 17, 2019
    Inventors: Spyridon Antonatos, Stefano Braghin, Akshar Kaul, Manish Kesarwani, Sameep Mehta
  • Patent number: 10176453
    Abstract: A method and associated systems for ensuring resilience of a business function manages resource availability for projects that perform mission-critical tasks for the business function. The method and systems create a model that reveals dependencies among types of resources needed by a project, such that the model describes how the unavailability of one instance of a resource propagates disruptions to other instances of the same type of resource. This model automatically identifies a resource type as being critical if a disruption of an instance of the resource type would render a project task infeasible, and if restoring that task would incur unacceptable cost. The model may also automatically identify a first resource type as being critical for a second resource type when disruption of the first resource type reduces the available capacity of the second resource type to an unacceptable level.
    Type: Grant
    Filed: January 3, 2018
    Date of Patent: January 8, 2019
    Assignee: International Business Machines Corporation
    Inventors: Sreyash D. Kenkre, Sameep Mehta, Krishnasuri Narayanam, Vinayaka D. Pandit