Eyal Kolman

Israel Contact Info
989 followers 500+ connections

Join to view profile

About

I'm an ML researcher with over 20 years of experience in the navy, Academy and industry…

Activity

Join now to see all activity

Experience & Education

  • Microsoft

View Eyal’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Publications

  • Automatic Rephrasing of Transcripts-based Action Items

    Findings of the Association for Computational Linguistics: ACL-IJCNLP 2021

    The automated transcription of spoken language, and meetings, in particular, is becoming more widespread as automatic speech
    recognition systems are becoming more accurate. This trend has significantly accelerated
    since the outbreak of the COVID-19 pandemic,
    which led to a major increase in the number
    of online meetings. However, the transcription of spoken language has not received much
    attention from the NLP community compared
    to documents and other forms of written…

    The automated transcription of spoken language, and meetings, in particular, is becoming more widespread as automatic speech
    recognition systems are becoming more accurate. This trend has significantly accelerated
    since the outbreak of the COVID-19 pandemic,
    which led to a major increase in the number
    of online meetings. However, the transcription of spoken language has not received much
    attention from the NLP community compared
    to documents and other forms of written language. In this paper, we study a variation of
    the summarization problem over the transcription of spoken language: given a transcribed
    meeting, and an action item (i.e., a commitment or request to perform a task), our goal
    is to generate a coherent and self-contained
    rephrasing of the action item. To this end, we
    compiled a novel dataset of annotated meeting transcripts, including human rephrasing of
    action items. We use state-of-the-art supervised text generation techniques and establish
    a strong baseline based on BART and UniLM
    (two pretrained transformer models). Due to
    the nature of natural speech, language is often broken and incomplete and the task is
    shown to be harder than an analogous task
    over email data. Particularly, we show that the
    baseline models can be greatly improved once
    models are provided with additional information. We compare two approaches: one incorporating features extracted by coreferenceresolution. Additional annotations are used to
    train an auxiliary model to detect the relevant
    context in the text. Based on the systematic human evaluation, our best models exhibit nearhuman-level rephrasing capability on a constrained subset of the problem

    Other authors
    See publication
  • Securely Computing a Ground Speed Model

    ACM Transactions on Intelligent Systems and Technology

    Consider a server offering risk assessment services and potential clients of these services. The risk assessment model that is run by the server is based on current and historical data of the clients. However, the clients might prefer not sharing such sensitive data with external parties such as the server, and the server might consider the possession of this data as a liability rather than an asset. Secure multi-party computation (MPC) enables one, in principle, to compute any function while…

    Consider a server offering risk assessment services and potential clients of these services. The risk assessment model that is run by the server is based on current and historical data of the clients. However, the clients might prefer not sharing such sensitive data with external parties such as the server, and the server might consider the possession of this data as a liability rather than an asset. Secure multi-party computation (MPC) enables one, in principle, to compute any function while hiding the inputs to the function, and would thus enable the computation of the risk assessment model while hiding the client’s data from the server. However, a direct application of a generic MPC solution to this problem is rather inefficient due to the large scale of the data and the complexity of the function. We examine a specific case of risk assessment—the ground speed model. In this model, the geographical locations of successive user-authentication attempts are compared, and a warning flag is raised if the physical speed required to move between these locations is greater than some threshold, and some other conditions, such as authentication from two related networks, do not hold. We describe a very efficient secure computation solution that is tailored for this problem. This solution demonstrates that a risk model can be applied over encrypted data with sufficient efficiency to fit the requirements of commercial systems.

    Other authors
    See publication
  • IP2User – Identifying the username of an IP Address in Network-Related Events

    The 2013 IEEE International Congress on Big Data, page 435 - 436

    Network devices deployed in organizations (Firewall, IDS, routers, antivirus, servers, etc.) logs users' activity as events. Based on these events users' behavioral profiles can be derived in order to detect anomalies, indicating potential attacks. The identifier of a user in most cases is the user's organizational username. While events are always logged with the source IP address they are not always logged with the relevant username and therefore, many of the collected events are not directly…

    Network devices deployed in organizations (Firewall, IDS, routers, antivirus, servers, etc.) logs users' activity as events. Based on these events users' behavioral profiles can be derived in order to detect anomalies, indicating potential attacks. The identifier of a user in most cases is the user's organizational username. While events are always logged with the source IP address they are not always logged with the relevant username and therefore, many of the collected events are not directly linked with the appropriate user. In this paper we describe a method for associating an IP address with an actual username based on a set of logged events. This is crucial precondition for generating an accurate user's profile. The proposed method was evaluated using real large datasets (logs) and showed 88% accuracy in the identification of usernames.

    Other authors
    See publication
  • Extracting symbolic knowledge from recurrent neural networks - A fuzzy logic approach

    Contribution of Fuzziness & Uncertainty to Modern Artificial Intelligence, Case-Based Reasoning

    Considerable research has been devoted to the integration of fuzzy logic (FL) tools with classic artificial intelligence (AI) paradigms. One reason for this is that FL provides powerful mechanisms for handling and processing symbolic information stated using natural language. In this respect, fuzzy rule-based systems are white-boxes, as they process information in a form that is easy to understand, verify and, if necessary, refine. The synergy between artificial neural networks (ANNs), which…

    Considerable research has been devoted to the integration of fuzzy logic (FL) tools with classic artificial intelligence (AI) paradigms. One reason for this is that FL provides powerful mechanisms for handling and processing symbolic information stated using natural language. In this respect, fuzzy rule-based systems are white-boxes, as they process information in a form that is easy to understand, verify and, if necessary, refine. The synergy between artificial neural networks (ANNs), which are notorious for their black-box character, and FL proved to be particularly successful. Such a synergy allows combining the powerful learning-from-examples capability of ANNs with the high-level symbolic information processing of FL systems. In this paper, we present a new approach for extracting symbolic information from recurrent neural networks (RNNs). The approach is based on the mathematical equivalence between a specific fuzzy rule-base and functions composed of sums of sigmoids. We show that this equivalence can be used to provide a comprehensible explanation of the RNN functioning. We demonstrate the applicability of our approach by using it to extract the knowledge embedded within an RNN trained to recognize a formal language.

    Other authors
    • Michael Margaliot
    See publication
  • Knowledge-Based Neurocomputing: A Fuzzy Logic Approach

    Springer

    In this monograph, we introduce a novel FRB, referred to as the
    Fuzzy All-permutations Rule-Base (FARB). We show that inferring the FARB, using standard tools from fuzzy logic theory, yields an input-output relationship that is mathematically equivalent to that of an ANN. Conversely, every standard ANN has an equivalent FARB. We provide the explicit bidirectional transformation between the ANN and the corresponding FARB.

    Other authors
    • Michael Margaliot
    See publication
  • A new approach to knowledge-based design of recurrent neural networks

    IEEE Transactions on Neural Networks

    A major drawback of artificial neural networks (ANNs) is their black-box character. This is especially true for recurrent neural networks (RNNs) because of their intricate feedback connections. In particular, given a problem and some initial information concerning its solution, it is not at all obvious how to design an RNN that is suitable for solving this problem. In this paper, we consider a fuzzy rule base with a special structure, referred to as the fuzzy all-permutations rule base (FARB)…

    A major drawback of artificial neural networks (ANNs) is their black-box character. This is especially true for recurrent neural networks (RNNs) because of their intricate feedback connections. In particular, given a problem and some initial information concerning its solution, it is not at all obvious how to design an RNN that is suitable for solving this problem. In this paper, we consider a fuzzy rule base with a special structure, referred to as the fuzzy all-permutations rule base (FARB). Inferring the FARB yields an input-output (IO) mapping that is mathematically equivalent to that of an RNN. We use this equivalence to develop two new knowledge-based design methods for RNNs. The first method, referred to as the direct approach, is based on stating the desired functioning of the RNN in terms of several sets of symbolic rules, each one corresponding to a subnetwork. Each set is then transformed into a suitable FARB. The second method is based on first using the direct approach to design a library of simple modules, such as counters or comparators, and realize them using RNNs. Once designed, the correctness of each RNN can be verified. Then, the initial design problem is solved by using these basic modules as building blocks. This yields a modular and systematic approach for knowledge-based design of RNNs. We demonstrate the efficiency of these approaches by designing RNNs that recognize both regular and nonregular formal languages.

    Other authors
    • Michael Margaliot
    See publication
  • Knowledge extraction from neural networks using the all-permutations fuzzy rule base: the LED display recognition problem

    IEEE transactions on neural networks

    A major drawback of artificial neural networks (ANNs) is their black-box character. Even when the trained network performs adequately, it is very difficult to understand its operation. In this letter, we use the mathematical equivalence between ANNs and a specific fuzzy rule base to extract the knowledge embedded in the network. We demonstrate this using a benchmark problem: the recognition of digits produced by a light emitting diode (LED) device. The method provides a symbolic and…

    A major drawback of artificial neural networks (ANNs) is their black-box character. Even when the trained network performs adequately, it is very difficult to understand its operation. In this letter, we use the mathematical equivalence between ANNs and a specific fuzzy rule base to extract the knowledge embedded in the network. We demonstrate this using a benchmark problem: the recognition of digits produced by a light emitting diode (LED) device. The method provides a symbolic and comprehensible description of the knowledge learned by the network during its training

    Other authors
    • Michael Margaliot
    See publication
  • Are artificial neural networks white boxes?

    IEEE transactions on Neural Networks

    In this paper, we introduce a novel Mamdani-type fuzzy model, referred to as the all-permutations fuzzy rule base (APFRB), and show that it is mathematically equivalent to a standard feedforward neural network. We describe several applications of this equivalence between a neural network and our fuzzy rule base (FRB), including knowledge extraction from and knowledge insertion into neural networks.

    Other authors
    • Michael Margaliot
    See publication

Patents

  • Secure data analytics

    Issued US US 9729525 B1

    Techniques of performing queries involve adapting a query to whether query data is encrypted. Along these lines, a data sensitivity policy defines which types of data is encrypted prior to storage in a data analytics database and which other types of data remain unencrypted. When a client formulates a query, the client encrypts a query input and then conceals the encrypted query input and query function to form concealed query logic. When the concealed query logic is received by a data…

    Techniques of performing queries involve adapting a query to whether query data is encrypted. Along these lines, a data sensitivity policy defines which types of data is encrypted prior to storage in a data analytics database and which other types of data remain unencrypted. When a client formulates a query, the client encrypts a query input and then conceals the encrypted query input and query function to form concealed query logic. When the concealed query logic is received by a data analytics server, the data analytics server determines whether the query data to be input into the concealed query logic is encrypted or unencrypted. If the query data is unencrypted, then the concealed query logic is unconcealed and the query input unencrypted so that the data analytics server may evaluate the query function without concealment to produce a query result.

    See patent
  • Partial password-based authentication using per-request risk scores

    Issued US US 9722996 B1

    A system that permits authentication based on a partial password, in which a risk score is assigned to an authentication request, and a minimum partial password size is generated based on the risk score. User-entered password characters are compared to one or more partial passwords having lengths equal to or greater than the minimum partial password size. If a match is found, the user is authenticated. A password similarity threshold for the request may also be generated based on the risk…

    A system that permits authentication based on a partial password, in which a risk score is assigned to an authentication request, and a minimum partial password size is generated based on the risk score. User-entered password characters are compared to one or more partial passwords having lengths equal to or greater than the minimum partial password size. If a match is found, the user is authenticated. A password similarity threshold for the request may also be generated based on the risk score, indicating a minimum level of similarity required between the user-entered password characters and the characters in a partial password, in order for there to be a match. When the user-entered password characters match a partial password, and the requesting user is authenticated, the system may stop inputting user-entered password characters, and/or transmitting the user-entered password characters to a server computer.

    Other inventors
    See patent
  • Providing security to an enterprise via user clustering

    Issued US US 9699196 B1

    A computer-implemented technique provides security to an enterprise. The technique involves receiving, by processing circuitry, personal information belonging to users of the enterprise. The technique further involves providing, by the processing circuitry, lists of user identifiers based on user relationships defined by the personal information. The lists of user identifiers respectively identify clusters of users of the enterprise. The technique further involves electronically imposing, by…

    A computer-implemented technique provides security to an enterprise. The technique involves receiving, by processing circuitry, personal information belonging to users of the enterprise. The technique further involves providing, by the processing circuitry, lists of user identifiers based on user relationships defined by the personal information. The lists of user identifiers respectively identify clusters of users of the enterprise. The technique further involves electronically imposing, by the processing circuitry, security classes on the clusters of users of the enterprise based on the lists of user identifiers. Along these lines, such classification can be used for risk assessment (e.g., authentication), alert filtering (e.g., filtering false alarms), and permission/privilege monitoring and/or assignment, among others.

    Other inventors
    See patent
  • Dynamic privacy management for communications of clients in privacy-preserving groups

    Issued US US 9660813 B1

    A server is configured to communicate with a group of clients over a network in one embodiment. The server maps the group of clients into a plurality of subgroups of bounded size, communicates to a given one of the clients information identifying the particular subgroup to which that client belongs as well as the other clients in that subgroup. The given client utilizes the communicated information to generate a ring signature over the corresponding subgroup of clients based on the communicated…

    A server is configured to communicate with a group of clients over a network in one embodiment. The server maps the group of clients into a plurality of subgroups of bounded size, communicates to a given one of the clients information identifying the particular subgroup to which that client belongs as well as the other clients in that subgroup. The given client utilizes the communicated information to generate a ring signature over the corresponding subgroup of clients based on the communicated information. The subgroup size may be bounded to a minimum size and a maximum size in accordance with a variable privacy parameter. The server can increase or decrease the value of the parameter in order to provide respective increased or decreased privacy to the clients, by making it respectively more or less difficult to determine which client in a corresponding one of the subgroups produced the received ring signature.

    Other inventors
    See patent
  • Data-driven alert prioritization

    Issued US US9601000 B1

    A technique provides alert prioritization. The technique involves selecting attributes to use as alert scoring factors. The technique further involves updating, for an incoming alert having particular attribute values for the selected attributes, count data to represent encounter of the incoming alert from perspectives of the selected attributes. The technique further involves generating an overall significance score for the incoming alert based on the updated count data. The overall…

    A technique provides alert prioritization. The technique involves selecting attributes to use as alert scoring factors. The technique further involves updating, for an incoming alert having particular attribute values for the selected attributes, count data to represent encounter of the incoming alert from perspectives of the selected attributes. The technique further involves generating an overall significance score for the incoming alert based on the updated count data. The overall significance score is a measure of alert significance relative to other alerts. Scored alerts then can be sorted so that investigators focus on the alerts with the highest significance scores. Such a technique is well suited for adaptive authentication (AA) and Security Information and Event Management (SIEM) systems among other alert-based systems such as churn analysis systems, malfunction detection systems, and the like.

    Other inventors
    See patent
  • Information processing systems with security-related feedback

    Issued US US 9558346 B1

    An information processing system implements a security system. The security system comprises a classifier configured to process information characterizing events in order to generate respective risk scores, and a data store coupled to the classifier and configured to store feedback relating to one or more attributes associated with an assessment of the risk scores by one or more users. The classifier is configured to utilize the feedback regarding the risk scores to learn riskiness of…

    An information processing system implements a security system. The security system comprises a classifier configured to process information characterizing events in order to generate respective risk scores, and a data store coupled to the classifier and configured to store feedback relating to one or more attributes associated with an assessment of the risk scores by one or more users. The classifier is configured to utilize the feedback regarding the risk scores to learn riskiness of particular events and to adjust its operation based on the learned riskiness, such that the risk score generated by the classifier for a given one of the events is based at least in part on the feedback received regarding risk scores generated for one or more previous ones of the events.

    Other inventors
    See patent
  • Method, apparatus and non-transitory processor-readable storage medium for providing security in a computer network

    Issued US11223623B1

    There are disclosed techniques for use in providing security in a computer network. In one embodiment, the techniques comprise a method including multiple steps. The method comprises receiving user access data characterizing user access with a protected resource within a computer network. The method also comprises evaluating the user access data to extract information therefrom that describes user access with respect to a feature of user access. The method also comprises determining a…

    There are disclosed techniques for use in providing security in a computer network. In one embodiment, the techniques comprise a method including multiple steps. The method comprises receiving user access data characterizing user access with a protected resource within a computer network. The method also comprises evaluating the user access data to extract information therefrom that describes user access with respect to a feature of user access. The method also comprises determining a cardinality value in connection with the feature based on the extracted information and a maximum cardinality threshold. It should be appreciated that the cardinality value is limited by the maximum cardinality threshold such that the cardinality value cannot exceed the maximum cardinality threshold. The method also comprises presenting the cardinality value for facilitating fraud detection.

    Other inventors
    • Assaf Mendelson
    • Eugene Gulko
    • Dan Karpati
    See patent
  • Unsupervised aggregation of security rules

    Issued US 9325733

    In this disclosure we present an innovative method to automatically handle, prune, and aggregate these huge rules lists. This is applied using data-driven approach which analyzes the cases in which each rule fires, correlate between the different rules alerts, and aggregate rules based on these correlations. This follows the approach of Association Rules which is a common unsupervised method for finding patterns in unlabeled data. We apply similar concepts where the handled objects are rules…

    In this disclosure we present an innovative method to automatically handle, prune, and aggregate these huge rules lists. This is applied using data-driven approach which analyzes the cases in which each rule fires, correlate between the different rules alerts, and aggregate rules based on these correlations. This follows the approach of Association Rules which is a common unsupervised method for finding patterns in unlabeled data. We apply similar concepts where the handled objects are rules and their alerts.

    Other inventors
    See patent
  • Detecting risky domains

    Issued US 14501485

    There is disclosed a technique for detecting risky domains. The technique comprises collecting information in connection with a domain. The technique also comprises generating a profile comprising at least one metric associated with the domain based on the collected information. The technique further comprises determining the riskiness in connection with the domain based on the generated profile.

    Other inventors
    See patent
  • Fast-flux detection utilizing domain name system information

    Issued US US14471540

    A new method for detection of Fast-Flux-based attcks

    Other inventors
    See patent
  • Detecting risky network communications based on evaluation using normal and abnormal behavior profiles

    Issued US US14039881

    A technique detects riskiness of a communication in a network based on behavior profiling. The technique involves generating a network history baseline (e.g., normal and abnormal behavior profiles) from prior network communications occurring in the network. The technique further involves, for a new network communication, assigning the new network communication a risk score based on a comparison of the new network communication to the network history baseline. The risk score is a numerical…

    A technique detects riskiness of a communication in a network based on behavior profiling. The technique involves generating a network history baseline (e.g., normal and abnormal behavior profiles) from prior network communications occurring in the network. The technique further involves, for a new network communication, assigning the new network communication a risk score based on a comparison of the new network communication to the network history baseline. The risk score is a numerical measure of behavioral normalcy relative to the prior network communications occurring in the network. The technique further involves providing an output signal having a first value when the risk score is above a predefined risk threshold to indicate that the communication is risky, and a second value which is different than the first value when the risk score is below the predefined risk threshold to indicate that the communication is not risky.

    Other inventors
    See patent
  • Data driven device detection

    Issued US 9,130,985

    Data driven device detection is provided, whereby a device is detected by obtaining a plurality of feature values for a given device; obtaining a set of device attributes for a plurality of potential devices; calculating a probability value that the given device is each potential device within the plurality of potential devices; identifying a candidate device associated with a maximum probability value among the calculated probability values; and labeling the given device as the candidate…

    Data driven device detection is provided, whereby a device is detected by obtaining a plurality of feature values for a given device; obtaining a set of device attributes for a plurality of potential devices; calculating a probability value that the given device is each potential device within the plurality of potential devices; identifying a candidate device associated with a maximum probability value among the calculated probability values; and labeling the given device as the candidate device if the associated maximum probability value satisfies a predefined threshold. The predefined threshold can be a function, for example, of whether the given user has previously used this device. The obtained feature values can be obtained for a selected set of features satisfying one or more predefined characteristic criteria. The device attributes can be obtained, for example, from a profile for each of the plurality of potential devices.

    Other inventors
    See patent
  • User authentication

    Issued US 9122866

    There is disclosed some techniques for selecting a user authentication challenge. In one example, the method comprises the steps of receiving an authentication request to authenticate a user and selecting a user authentication challenge to issue to the user in response to receiving the authentication request. The selection of the user authentication challenge comprises selecting a user authentication challenge among a plurality of user authentication challenges based on the cost effectiveness…

    There is disclosed some techniques for selecting a user authentication challenge. In one example, the method comprises the steps of receiving an authentication request to authenticate a user and selecting a user authentication challenge to issue to the user in response to receiving the authentication request. The selection of the user authentication challenge comprises selecting a user authentication challenge among a plurality of user authentication challenges based on the cost effectiveness of the respective user authentication challenges and characteristics of the authentication request.

    Other inventors
    See patent
  • Data-driven detection of servers and clients

    Issued US US13832280

    An improved technique involves processing network traffic data to automatically establish whether a device on the network satisfies a particular set of constraints. Along these lines, a SIEM server observes and processes incoming and outgoing traffic data corresponding to a particular device at an address of the network. The SIEM server then analyzes this traffic data in order to determine whether the data satisfies a set of constraints satisfied by a client, or another set of constraints…

    An improved technique involves processing network traffic data to automatically establish whether a device on the network satisfies a particular set of constraints. Along these lines, a SIEM server observes and processes incoming and outgoing traffic data corresponding to a particular device at an address of the network. The SIEM server then analyzes this traffic data in order to determine whether the data satisfies a set of constraints satisfied by a client, or another set of constraints satisfied by a server. The SIEM server then applies the label of “client” or “server” to the device according to which set of constraints the SIEM server determines the data to have satisfied.

    Other inventors
    See patent
  • Active learning-based fraud detection in adaptive authentication systems

    Issued US 8875267

    Active learning-based fraud detection techniques are provided in adaptive authentication systems. An authentication request from an authentication requestor is processed by receiving the authentication request from the authentication requester; comparing current data for the user associated with the user identifier with historical data for the user; generating an adaptive authentication result based on the comparison indicating a likelihood current user data is associated with a fraudulent…

    Active learning-based fraud detection techniques are provided in adaptive authentication systems. An authentication request from an authentication requestor is processed by receiving the authentication request from the authentication requester; comparing current data for the user associated with the user identifier with historical data for the user; generating an adaptive authentication result based on the comparison indicating a likelihood current user data is associated with a fraudulent user; and performing one or more additional authentication operations to improve learning if the request satisfies one or more predefined non-risk based criteria. The predefined non-risk based criteria comprises, for example, (i) the request receiving a riskiness score below a threshold based on current data and wherein the request was expected to have a risk score above a threshold, or (ii) the request being in a bucket having a number of tagged events below a threshold.

    Other inventors
    See patent
  • Similarity-based fraud detection in adaptive authentication systems

    Issued US 8,856,923

    Similarity-based fraud detection techniques are provided in adaptive authentication systems. A method is provided for determining if an event is fraudulent by obtaining a plurality of tagged events and one or more untagged events, wherein the tagged events indicate a likelihood of whether the corresponding event was fraudulent; constructing a graph, wherein each node in the graph represents an event and has a value representing a likelihood of whether the corresponding event was fraudulent and…

    Similarity-based fraud detection techniques are provided in adaptive authentication systems. A method is provided for determining if an event is fraudulent by obtaining a plurality of tagged events and one or more untagged events, wherein the tagged events indicate a likelihood of whether the corresponding event was fraudulent; constructing a graph, wherein each node in the graph represents an event and has a value representing a likelihood of whether the corresponding event was fraudulent and wherein similar transactions are connected via weighted links; diffusing through weights in the graph to assign values to nodes such that neighbors of nodes having non-zero values receive similar values as the neighbors; and classifying whether at least one of the one or more untagged events is fraudulent based on the assigned values.

    Other inventors
    See patent
  • Managing user access with mobile device posture

    Issued US 8,819,769

    An improved technique for managing access of a user of a computing machine to a remote network collects device posture information about the user's mobile device. The mobile device runs a soft token, and the collected posture information pertains to various aspects of the mobile device, such as the mobile device's hardware, software, environment, and/or users, for example. The server applies the collected device posture information along with token codes from the soft token in authenticating…

    An improved technique for managing access of a user of a computing machine to a remote network collects device posture information about the user's mobile device. The mobile device runs a soft token, and the collected posture information pertains to various aspects of the mobile device, such as the mobile device's hardware, software, environment, and/or users, for example. The server applies the collected device posture information along with token codes from the soft token in authenticating the user to the remote network.

    Other inventors
    See patent
  • Distributed anonymized communications

    Issued US 9015231

    A server is configured to communicate with a group of clients over a network. Each of the clients obtains a corresponding informational message comprising security-related information such as an indication of compromise (IOC), inserts noise in the information message to generate an anonymized message, and communicates the anonymized message to the server. The anonymized messages communicated by the respective clients to the server may be configured so as to prevent the server from identifying…

    A server is configured to communicate with a group of clients over a network. Each of the clients obtains a corresponding informational message comprising security-related information such as an indication of compromise (IOC), inserts noise in the information message to generate an anonymized message, and communicates the anonymized message to the server. The anonymized messages communicated by the respective clients to the server may be configured so as to prevent the server from identifying any individual client associated with a particular one of the anonymized messages, while also allowing the server to extract from the anonymized messages collectively one or more characteristics of the underlying informational messages. A given client may insert noise in an informational message by, for example, selecting a noise value from a specified range of noise values, and combining the informational message and the selected noise value to generate the anonymized message.

    Other inventors
    See patent
  • Fast speaker hunting in lawful interception systems

    Issued US US 20120155663 A1

    A method for spotting an interaction in which a target speaker associated with a current index or current interaction speaks, the method comprising: receiving an interaction and an index associated with the interaction, the index associated with additional data; receiving the current interaction or current index associated with the target speaker; obtaining current data associated with the current interaction or current index; filtering the index using the additional data, in accordance with…

    A method for spotting an interaction in which a target speaker associated with a current index or current interaction speaks, the method comprising: receiving an interaction and an index associated with the interaction, the index associated with additional data; receiving the current interaction or current index associated with the target speaker; obtaining current data associated with the current interaction or current index; filtering the index using the additional data, in accordance with the current data associated with the current interaction or current index, and obtaining a matching index; and comparing the current index or a representation of the current interaction with the matching index to obtain a target speaker index.

    Other inventors
    See patent

Honors & Awards

  • Excellence scholarship from the Rabinovich fund

    The Rabinovich fund

  • Outstanding Assistant Lecturer

    Tel-Aviv University

  • Outstanding Assistant Lecturer

    Tel-Aviv university

Languages

  • Hebrew

    -

  • English

    -

Recommendations received

More activity by Eyal

View Eyal’s full profile

  • See who you know in common
  • Get introduced
  • Contact Eyal directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Eyal Kolman

Add new skills with these courses