-
公开(公告)号:US11386157B2
公开(公告)日:2022-07-12
申请号:US16457203
申请日:2019-06-28
申请人: Intel Corporation
发明人: Luis Carlos Maria Remis , Ignacio Javier Alvarez , Li Chen , Javier Felip Leon , David Israel Gonzalez Aguirre , Justin Gottschlich , Javier Sebastian Turek
IPC分类号: G06F16/9032 , G06F16/2457 , G06F16/9038
摘要: Methods and apparatus to facilitate generation of database queries are disclosed. An example apparatus includes a generator to generate a global importance tensor. The global importance tensor based on a knowledge graph representative of information stored in a database. The knowledge graph includes objects and connections between the objects. The global importance tensor includes importance values for different types of the connections between the objects. The example apparatus further includes an importance adaptation analyzer to generate a session importance tensor based on the global importance tensor and a user query, and a user interface to provide a suggested query to a user based on the session importance tensor.
-
公开(公告)号:US20200028865A1
公开(公告)日:2020-01-23
申请号:US16421044
申请日:2019-05-23
申请人: Intel Corporation
发明人: Li Chen
摘要: Systems and methods may be used to prevent attacks on a malware detection system. A method may include modeling a time series of directed graphs using incoming binary files during training of a machine learning system and detecting, during a time-window of the time series, an anomaly based on a directed graph of the time series of directed graphs. The method may include providing an alert that the anomaly has corrupted the machine learning system. The method may include preventing or remedying corruption of the machine learning system.
-
公开(公告)号:US20190080089A1
公开(公告)日:2019-03-14
申请号:US15700489
申请日:2017-09-11
申请人: Intel Corporation
发明人: Li Chen
摘要: Systems and methods may be used to classify incoming testing data, such as binaries, function calls, an application package, or the like, to determine whether the testing data is contaminated using an adversarial attack or benign while training a machine learning system to detect malware. A method may include using a sparse coding technique or a semi-supervised learning technique to classify the testing data. Training data may be used to represent the testing data using the sparse coding technique or to train the supervised portion of the semi-supervised learning technique.
-
4.
公开(公告)号:US20160202771A1
公开(公告)日:2016-07-14
申请号:US15075645
申请日:2016-03-21
申请人: Intel Corporation
发明人: Hamid Abdollahi , Dan Eisenhardt , Li Chen
IPC分类号: G06F3/01 , G02B27/01 , G06F3/0346
CPC分类号: G06F3/012 , A42B3/042 , A63B2071/0666 , G02B27/017 , G02B27/0172 , G02B2027/014 , G02B2027/0187 , G06F3/017 , G06F3/0346
摘要: A head-mounted information system is provided, the head-mounted information system comprising a frame configured to be mounted on a head of a user, a display unit coupled to the frame, a sensor unit coupled to the frame comprising one or more motion sensors, and, a processor unit coupled to the frame and connected to receive signals from the motion sensors. The processor unit comprises a processor and a memory accessible by the processor. The processor unit is configured to monitor the received signals and enter a gesture control mode upon detection of a gesture control enable signal. In the gesture control mode the processor is configured to convert signals received from the motion sensors into menu navigation commands.
摘要翻译: 提供了一种头戴式信息系统,头戴式信息系统包括被配置为安装在用户的头部上的框架,耦合到框架的显示单元,耦合到框架的传感器单元,该传感器单元包括一个或多个运动传感器 以及耦合到所述帧并被连接以从所述运动传感器接收信号的处理器单元。 处理器单元包括处理器和由处理器可访问的存储器。 处理器单元被配置为在检测到手势控制使能信号时监视所接收的信号并输入手势控制模式。 在手势控制模式中,处理器被配置为将从运动传感器接收的信号转换为菜单导航命令。
-
公开(公告)号:US20230119658A1
公开(公告)日:2023-04-20
申请号:US18074260
申请日:2022-12-02
申请人: Intel Corporation
发明人: Li Chen
摘要: Systems and methods may be used to classify incoming testing data, such as binaries, function calls, an application package, or the like, to determine whether the testing data is contaminated using an adversarial attack or benign while training a machine learning system to detect malware. A method may include using a sparse coding technique or a semi-supervised learning technique to classify the testing data. Training data may be used to represent the testing data using the sparse coding technique or to train the supervised portion of the semi-supervised learning technique.
-
公开(公告)号:US11455392B2
公开(公告)日:2022-09-27
申请号:US16370849
申请日:2019-03-29
申请人: Intel Corporation
发明人: Abhishek Basak , Li Chen , Salmin Sultana , Anna Trikalinou , Erdem Aktas , Saeedeh Komijani
IPC分类号: G06F21/56 , G06F12/1027 , G06N20/00 , G06F21/55 , G06F21/79
摘要: Methods, apparatus, systems and articles of manufacture are disclosed for anomalous memory access pattern detection for translational lookaside buffers. An example apparatus includes a communication interface to retrieve a first eviction data set from a translational lookaside buffer associated with a central processing unit; a machine learning engine to: generate an anomaly detection model based upon at least one of a second eviction data set not including an anomaly and a third eviction data set including the anomaly; and determine whether the anomaly is present in the first eviction data set based on the anomaly detection model; and an alert generator to at least one of modify a bit value or terminate memory access operations when the anomaly is determined to be present.
-
公开(公告)号:US20220126863A1
公开(公告)日:2022-04-28
申请号:US17434716
申请日:2020-03-27
申请人: Intel Corporation
发明人: Hassnaa Moustafa , Soila P. Kavulya , Igor Tatourian , Rita H. Wouhaybi , Ignacio J. Alvarez , Fatema S. Adenwala , Cagri C. Tanriover , Maria S. Elli , David J. Zage , Jithin Sankar Sankaran Kutty , Christopher E. Lopez-Araiza , Magdiel F. Galán-Oliveras , Li Chen
摘要: An apparatus comprising at least one interface to receive a signal identifying a second vehicle in proximity of a first vehicle; and processing circuitry to obtain a behavioral model associated with the second vehicle, wherein the behavioral model defines driving behavior of the second vehicle; use the behavioral model to predict actions of the second vehicle; and determine a path plan for the first vehicle based on the predicted actions of the second vehicle.
-
公开(公告)号:US10917415B2
公开(公告)日:2021-02-09
申请号:US15867251
申请日:2018-01-10
申请人: Intel Corporation
发明人: Li Chen
摘要: A technique includes processing a plurality of sets of program code to extract call graphs; determining similarities between the call graphs; applying unsupervised machine learning to an input formed from the determined similarities to determine latent features of the input; clustering the determined latent features; and determining a characteristic of a given program code set of the plurality of program code sets based on a result of the clustering.
-
9.
公开(公告)号:US11657162B2
公开(公告)日:2023-05-23
申请号:US16361397
申请日:2019-03-22
申请人: Intel Corporation
发明人: Michael Kounavis , Antonios Papadimitriou , Anindya Sankar Paul , Micah Sheller , Li Chen , Cory Cornelius , Brandon Edwards
CPC分类号: G06F21/60 , G06F21/52 , G06N3/0454 , G06N3/08
摘要: In one example an apparatus comprises a memory and a processor to create, from a first deep neural network (DNN) model, a first plurality of DNN models, generate a first set of adversarial examples that are misclassified by the first plurality of deep neural network (DNN) models, determine a first set of activation path differentials between the first plurality of adversarial examples, generate, from the first set of activation path differentials, at least one composite adversarial example which incorporates at least one intersecting critical path that is shared between at least two adversarial examples in the first set of adversarial examples, and use the at least one composite adversarial example to generate a set of inputs for a subsequent training iteration of the DNN model. Other examples may be described.
-
公开(公告)号:US11416603B2
公开(公告)日:2022-08-16
申请号:US16246187
申请日:2019-01-11
申请人: Intel Corporation
发明人: Zheng Zhang , Jason Martin , Justin Gottschlich , Abhilasha Bhargav-Spantzel , Salmin Sultana , Li Chen , Wei Li , Priyam Biswas , Paul Carlson
摘要: Methods, systems, articles of manufacture and apparatus to detect process hijacking are disclosed herein. An example apparatus to detect control flow anomalies includes a parsing engine to compare a target instruction pointer (TIP) address to a dynamic link library (DLL) module list, and in response to detecting a match of the TIP address to a DLL in the DLL module list, set a first portion of a normalized TIP address to a value equal to an identifier of the DLL. The example apparatus disclosed herein also includes a DLL entry point analyzer to set a second portion of the normalized TIP address based on a comparison between the TIP address and an entry point of the DLL, and a model compliance engine to generate a flow validity decision based on a comparison between (a) the first and second portion of the normalized TIP address and (b) a control flow integrity model.
-
-
-
-
-
-
-
-
-