| 11538053 |
Method, system, and computer program product for applying deep learning analysis to financial device usage |
Mahashweta Das, Nikan Chavoshi |
2022-12-27 |
| 11502837 |
Techniques for performing secure operations |
Sivanarayana Gaddam, Rohit Sinha, Atul Luykx |
2022-11-15 |
| 11496466 |
Using an enrolled biometric dataset to detect adversarial examples in biometrics-based authentication system |
Yuhang Wu, Sunpreet Singh Arora |
2022-11-08 |
| 11487997 |
Method, system, and computer program product for local approximation of a predictive model |
Liang Gou, Junpeng Wang, Wei Zhang |
2022-11-01 |
| 11481485 |
Methods and systems for peer grouping in insider threat detection |
Yuhang Wu, Yanhong Wu, Hossein Hamooni, Yu-San Lin |
2022-10-25 |
| 11443346 |
Group item recommendations for ephemeral groups based on mutual information maximization |
Aravind Sankar, Yanhong Wu, Yuhang Wu, Wei Zhang |
2022-09-13 |
| 11429813 |
Automated model selection for network-based image recognition service |
Avinash Aghoram Ravichandran, Rahul Bhotika, Stefano Soatto, Pietro Perona |
2022-08-30 |
| 11416288 |
Method, device and computer program product for service management |
Jian Wen, Yi Wang, Xing Min, Haitao Li, Lili Lin +2 more |
2022-08-16 |
| 11269900 |
Transition regularized matrix factorization for sequential recommendation |
Mahashweta Das, Shamim Samadi |
2022-03-08 |
| 11244321 |
System, method, and computer program product for evaluating a fraud detection system |
Yuhang Wu |
2022-02-08 |