Systems and methods for auto machine learning and neural architecture search

    公开(公告)号:US11630990B2

    公开(公告)日:2023-04-18

    申请号:US16358554

    申请日:2019-03-19

    Abstract: The present disclosure provides systems, methods and computer-readable media for optimizing the neural architecture search for the automated machine learning process. In one aspect, neural architecture search method including selecting a neural architecture for training as part of an automated machine learning process; collecting statistical parameters on individual nodes of the neural architecture during the training; determining, based on the statistical parameters, active nodes of the neural architecture to form a candidate neural architecture; and validating the candidate neural architecture to produce a trained neural architecture to be used in implemented an application or a service.

    BUDGETED NEURAL NETWORK ARCHITECTURE SEARCH SYSTEM AND METHOD

    公开(公告)号:US20200302270A1

    公开(公告)日:2020-09-24

    申请号:US16357603

    申请日:2019-03-19

    Abstract: A neural network architecture search may be conducted by a controller to generate a neural network. The controller may perform the search by generating a directed acyclic graph across nodes in a search space, the nodes representing compute operations for a neural network. As the search is performed, the controller may retrieve resource availability information to modify the likelihood of a generated neural network architecture including previously unused nodes.

    LIGHTWEIGHT MALWARE INFERENCE ARCHITECTURE
    15.
    发明申请

    公开(公告)号:US20190294792A1

    公开(公告)日:2019-09-26

    申请号:US16102571

    申请日:2018-08-13

    Abstract: Systems, methods, computer-readable media, and devices are disclosed for creating a malware inference architecture. An instruction set is received at an endpoint in a network. At the endpoint, the instruction set is classified as potentially malicious or benign according to a first machine learning model based on a first parameter set. If the instruction set is determined by the first machine learning model to be potentially malicious, the instruction set is sent to a cloud system and is analyzed at the cloud system using a second machine learning model to determine if the instruction set comprises malicious code. The second machine learning model is configured to classify a type of security risk associated with the instruction set based on a second parameter set that is different from the first parameter set.

    RETROSPECTIVE CAMPAIGN DETECTION, CATEGORIZATION, CLASSIFICATION, AND REMEDIATION

    公开(公告)号:US20250080577A1

    公开(公告)日:2025-03-06

    申请号:US18475896

    申请日:2023-09-27

    Abstract: This disclosure describes techniques and mechanisms to retroactively identifying, classifying, categorizing, and/or remediating campaigns by an email threat defense system. The described techniques may perform a time-series analysis on record data associated with emails and identify campaigns that have bypassed threat detection mechanisms. The described techniques may extract and correlate features of the record data in order to label and determine whether a campaign is malicious. Where the email campaign is malicious, remedial action(s) can occur. Accordingly, the described techniques may remediate false negatives in a network and improve network security.

    Algorithm to detect malicious emails impersonating brands

    公开(公告)号:US12244562B2

    公开(公告)日:2025-03-04

    申请号:US17867464

    申请日:2022-07-18

    Abstract: Techniques for an email-security system to screen emails, extract information from the emails, analyze the information, assign probability scores to the emails, and classify the emails as likely fraudulent or not. The system may analyze emails for users and identify fraudulent emails by analyzing the contents of the emails. The system may evaluate the contents of the emails to determine probability score(s) which may further determine an overall probability score. The system may then classify the email as fraudulent, or not, and may perform actions including blocking the email, allowing the email, flagging the email, etc. In some instances, the screened emails may include legitimate brand domain addresses, names, images, URL(s), and the like. However, the screened emails may contain a reply-to domain address that matches a free email service provider domain. In such instances, the email-security system may assign a probability score indicative that the screened email is fraudulent.

    NEURAL ARCHITECTURE CONSTRUCTION USING ENVELOPENETS FOR IMAGE RECOGNITION

    公开(公告)号:US20190286945A1

    公开(公告)日:2019-09-19

    申请号:US16177581

    申请日:2018-11-01

    Abstract: In one embodiment, a device forms a neural network envelope cell that comprises a plurality of convolution-based filters in series or parallel. The device constructs a convolutional neural network by stacking copies of the envelope cell in series. The device trains, using a training dataset of images, the convolutional neural network to perform image classification by iteratively collecting variance metrics for each filter in each envelope cell, pruning filters with low variance metrics from the convolutional neural network, and appending a new copy of the envelope cell into the convolutional neural network.

Patent Agency Ranking