“Together with Andrew Ng and Geoffrey Hinton, Eyal has taught me everything I know about machine learning. He was a major reason for me starting to work at RSA and staying there for three years. As the master of practical machine learning, Eyal is the first person I want to consult with when facing a new problem.”
About
Activity
-
After 4 amazing years at MSAI Hive, working on awesome productivity products (AI Tasks on Viva Insights , Meeting Intelligence, Teams Chat Copilot)…
After 4 amazing years at MSAI Hive, working on awesome productivity products (AI Tasks on Viva Insights , Meeting Intelligence, Teams Chat Copilot)…
Liked by Eyal Kolman
-
Hiring a Senior Applied Scientist in London! Come work with us on GenAI, recommendation, personalization, ranking, and more! We work on a real…
Hiring a Senior Applied Scientist in London! Come work with us on GenAI, recommendation, personalization, ranking, and more! We work on a real…
Liked by Eyal Kolman
-
After all these years in the tech industry, I'm still amazed at how breakthrough developments that impact millions of users often start with just a…
After all these years in the tech industry, I'm still amazed at how breakthrough developments that impact millions of users often start with just a…
Liked by Eyal Kolman
Experience & Education
Publications
-
Automatic Rephrasing of Transcripts-based Action Items
Findings of the Association for Computational Linguistics: ACL-IJCNLP 2021
The automated transcription of spoken language, and meetings, in particular, is becoming more widespread as automatic speech
recognition systems are becoming more accurate. This trend has significantly accelerated
since the outbreak of the COVID-19 pandemic,
which led to a major increase in the number
of online meetings. However, the transcription of spoken language has not received much
attention from the NLP community compared
to documents and other forms of written…The automated transcription of spoken language, and meetings, in particular, is becoming more widespread as automatic speech
recognition systems are becoming more accurate. This trend has significantly accelerated
since the outbreak of the COVID-19 pandemic,
which led to a major increase in the number
of online meetings. However, the transcription of spoken language has not received much
attention from the NLP community compared
to documents and other forms of written language. In this paper, we study a variation of
the summarization problem over the transcription of spoken language: given a transcribed
meeting, and an action item (i.e., a commitment or request to perform a task), our goal
is to generate a coherent and self-contained
rephrasing of the action item. To this end, we
compiled a novel dataset of annotated meeting transcripts, including human rephrasing of
action items. We use state-of-the-art supervised text generation techniques and establish
a strong baseline based on BART and UniLM
(two pretrained transformer models). Due to
the nature of natural speech, language is often broken and incomplete and the task is
shown to be harder than an analogous task
over email data. Particularly, we show that the
baseline models can be greatly improved once
models are provided with additional information. We compare two approaches: one incorporating features extracted by coreferenceresolution. Additional annotations are used to
train an auxiliary model to detect the relevant
context in the text. Based on the systematic human evaluation, our best models exhibit nearhuman-level rephrasing capability on a constrained subset of the problemOther authorsSee publication -
Securely Computing a Ground Speed Model
ACM Transactions on Intelligent Systems and Technology
Consider a server offering risk assessment services and potential clients of these services. The risk assessment model that is run by the server is based on current and historical data of the clients. However, the clients might prefer not sharing such sensitive data with external parties such as the server, and the server might consider the possession of this data as a liability rather than an asset. Secure multi-party computation (MPC) enables one, in principle, to compute any function while…
Consider a server offering risk assessment services and potential clients of these services. The risk assessment model that is run by the server is based on current and historical data of the clients. However, the clients might prefer not sharing such sensitive data with external parties such as the server, and the server might consider the possession of this data as a liability rather than an asset. Secure multi-party computation (MPC) enables one, in principle, to compute any function while hiding the inputs to the function, and would thus enable the computation of the risk assessment model while hiding the client’s data from the server. However, a direct application of a generic MPC solution to this problem is rather inefficient due to the large scale of the data and the complexity of the function. We examine a specific case of risk assessment—the ground speed model. In this model, the geographical locations of successive user-authentication attempts are compared, and a warning flag is raised if the physical speed required to move between these locations is greater than some threshold, and some other conditions, such as authentication from two related networks, do not hold. We describe a very efficient secure computation solution that is tailored for this problem. This solution demonstrates that a risk model can be applied over encrypted data with sufficient efficiency to fit the requirements of commercial systems.
Other authorsSee publication -
IP2User – Identifying the username of an IP Address in Network-Related Events
The 2013 IEEE International Congress on Big Data, page 435 - 436
Network devices deployed in organizations (Firewall, IDS, routers, antivirus, servers, etc.) logs users' activity as events. Based on these events users' behavioral profiles can be derived in order to detect anomalies, indicating potential attacks. The identifier of a user in most cases is the user's organizational username. While events are always logged with the source IP address they are not always logged with the relevant username and therefore, many of the collected events are not directly…
Network devices deployed in organizations (Firewall, IDS, routers, antivirus, servers, etc.) logs users' activity as events. Based on these events users' behavioral profiles can be derived in order to detect anomalies, indicating potential attacks. The identifier of a user in most cases is the user's organizational username. While events are always logged with the source IP address they are not always logged with the relevant username and therefore, many of the collected events are not directly linked with the appropriate user. In this paper we describe a method for associating an IP address with an actual username based on a set of logged events. This is crucial precondition for generating an accurate user's profile. The proposed method was evaluated using real large datasets (logs) and showed 88% accuracy in the identification of usernames.
Other authorsSee publication -
Extracting symbolic knowledge from recurrent neural networks - A fuzzy logic approach
Contribution of Fuzziness & Uncertainty to Modern Artificial Intelligence, Case-Based Reasoning
Considerable research has been devoted to the integration of fuzzy logic (FL) tools with classic artificial intelligence (AI) paradigms. One reason for this is that FL provides powerful mechanisms for handling and processing symbolic information stated using natural language. In this respect, fuzzy rule-based systems are white-boxes, as they process information in a form that is easy to understand, verify and, if necessary, refine. The synergy between artificial neural networks (ANNs), which…
Considerable research has been devoted to the integration of fuzzy logic (FL) tools with classic artificial intelligence (AI) paradigms. One reason for this is that FL provides powerful mechanisms for handling and processing symbolic information stated using natural language. In this respect, fuzzy rule-based systems are white-boxes, as they process information in a form that is easy to understand, verify and, if necessary, refine. The synergy between artificial neural networks (ANNs), which are notorious for their black-box character, and FL proved to be particularly successful. Such a synergy allows combining the powerful learning-from-examples capability of ANNs with the high-level symbolic information processing of FL systems. In this paper, we present a new approach for extracting symbolic information from recurrent neural networks (RNNs). The approach is based on the mathematical equivalence between a specific fuzzy rule-base and functions composed of sums of sigmoids. We show that this equivalence can be used to provide a comprehensible explanation of the RNN functioning. We demonstrate the applicability of our approach by using it to extract the knowledge embedded within an RNN trained to recognize a formal language.
Other authors -
-
Knowledge-Based Neurocomputing: A Fuzzy Logic Approach
Springer
In this monograph, we introduce a novel FRB, referred to as the
Fuzzy All-permutations Rule-Base (FARB). We show that inferring the FARB, using standard tools from fuzzy logic theory, yields an input-output relationship that is mathematically equivalent to that of an ANN. Conversely, every standard ANN has an equivalent FARB. We provide the explicit bidirectional transformation between the ANN and the corresponding FARB.Other authors -
-
A new approach to knowledge-based design of recurrent neural networks
IEEE Transactions on Neural Networks
A major drawback of artificial neural networks (ANNs) is their black-box character. This is especially true for recurrent neural networks (RNNs) because of their intricate feedback connections. In particular, given a problem and some initial information concerning its solution, it is not at all obvious how to design an RNN that is suitable for solving this problem. In this paper, we consider a fuzzy rule base with a special structure, referred to as the fuzzy all-permutations rule base (FARB)…
A major drawback of artificial neural networks (ANNs) is their black-box character. This is especially true for recurrent neural networks (RNNs) because of their intricate feedback connections. In particular, given a problem and some initial information concerning its solution, it is not at all obvious how to design an RNN that is suitable for solving this problem. In this paper, we consider a fuzzy rule base with a special structure, referred to as the fuzzy all-permutations rule base (FARB). Inferring the FARB yields an input-output (IO) mapping that is mathematically equivalent to that of an RNN. We use this equivalence to develop two new knowledge-based design methods for RNNs. The first method, referred to as the direct approach, is based on stating the desired functioning of the RNN in terms of several sets of symbolic rules, each one corresponding to a subnetwork. Each set is then transformed into a suitable FARB. The second method is based on first using the direct approach to design a library of simple modules, such as counters or comparators, and realize them using RNNs. Once designed, the correctness of each RNN can be verified. Then, the initial design problem is solved by using these basic modules as building blocks. This yields a modular and systematic approach for knowledge-based design of RNNs. We demonstrate the efficiency of these approaches by designing RNNs that recognize both regular and nonregular formal languages.
Other authors -
-
Knowledge extraction from neural networks using the all-permutations fuzzy rule base: the LED display recognition problem
IEEE transactions on neural networks
A major drawback of artificial neural networks (ANNs) is their black-box character. Even when the trained network performs adequately, it is very difficult to understand its operation. In this letter, we use the mathematical equivalence between ANNs and a specific fuzzy rule base to extract the knowledge embedded in the network. We demonstrate this using a benchmark problem: the recognition of digits produced by a light emitting diode (LED) device. The method provides a symbolic and…
A major drawback of artificial neural networks (ANNs) is their black-box character. Even when the trained network performs adequately, it is very difficult to understand its operation. In this letter, we use the mathematical equivalence between ANNs and a specific fuzzy rule base to extract the knowledge embedded in the network. We demonstrate this using a benchmark problem: the recognition of digits produced by a light emitting diode (LED) device. The method provides a symbolic and comprehensible description of the knowledge learned by the network during its training
Other authors -
-
Are artificial neural networks white boxes?
IEEE transactions on Neural Networks
In this paper, we introduce a novel Mamdani-type fuzzy model, referred to as the all-permutations fuzzy rule base (APFRB), and show that it is mathematically equivalent to a standard feedforward neural network. We describe several applications of this equivalence between a neural network and our fuzzy rule base (FRB), including knowledge extraction from and knowledge insertion into neural networks.
Other authors -
Patents
-
Secure data analytics
Issued US US 9729525 B1
Techniques of performing queries involve adapting a query to whether query data is encrypted. Along these lines, a data sensitivity policy defines which types of data is encrypted prior to storage in a data analytics database and which other types of data remain unencrypted. When a client formulates a query, the client encrypts a query input and then conceals the encrypted query input and query function to form concealed query logic. When the concealed query logic is received by a data…
Techniques of performing queries involve adapting a query to whether query data is encrypted. Along these lines, a data sensitivity policy defines which types of data is encrypted prior to storage in a data analytics database and which other types of data remain unencrypted. When a client formulates a query, the client encrypts a query input and then conceals the encrypted query input and query function to form concealed query logic. When the concealed query logic is received by a data analytics server, the data analytics server determines whether the query data to be input into the concealed query logic is encrypted or unencrypted. If the query data is unencrypted, then the concealed query logic is unconcealed and the query input unencrypted so that the data analytics server may evaluate the query function without concealment to produce a query result.
-
Partial password-based authentication using per-request risk scores
Issued US US 9722996 B1
A system that permits authentication based on a partial password, in which a risk score is assigned to an authentication request, and a minimum partial password size is generated based on the risk score. User-entered password characters are compared to one or more partial passwords having lengths equal to or greater than the minimum partial password size. If a match is found, the user is authenticated. A password similarity threshold for the request may also be generated based on the risk…
A system that permits authentication based on a partial password, in which a risk score is assigned to an authentication request, and a minimum partial password size is generated based on the risk score. User-entered password characters are compared to one or more partial passwords having lengths equal to or greater than the minimum partial password size. If a match is found, the user is authenticated. A password similarity threshold for the request may also be generated based on the risk score, indicating a minimum level of similarity required between the user-entered password characters and the characters in a partial password, in order for there to be a match. When the user-entered password characters match a partial password, and the requesting user is authenticated, the system may stop inputting user-entered password characters, and/or transmitting the user-entered password characters to a server computer.
Other inventorsSee patent -
Providing security to an enterprise via user clustering
Issued US US 9699196 B1
A computer-implemented technique provides security to an enterprise. The technique involves receiving, by processing circuitry, personal information belonging to users of the enterprise. The technique further involves providing, by the processing circuitry, lists of user identifiers based on user relationships defined by the personal information. The lists of user identifiers respectively identify clusters of users of the enterprise. The technique further involves electronically imposing, by…
A computer-implemented technique provides security to an enterprise. The technique involves receiving, by processing circuitry, personal information belonging to users of the enterprise. The technique further involves providing, by the processing circuitry, lists of user identifiers based on user relationships defined by the personal information. The lists of user identifiers respectively identify clusters of users of the enterprise. The technique further involves electronically imposing, by the processing circuitry, security classes on the clusters of users of the enterprise based on the lists of user identifiers. Along these lines, such classification can be used for risk assessment (e.g., authentication), alert filtering (e.g., filtering false alarms), and permission/privilege monitoring and/or assignment, among others.
Other inventorsSee patent -
Dynamic privacy management for communications of clients in privacy-preserving groups
Issued US US 9660813 B1
A server is configured to communicate with a group of clients over a network in one embodiment. The server maps the group of clients into a plurality of subgroups of bounded size, communicates to a given one of the clients information identifying the particular subgroup to which that client belongs as well as the other clients in that subgroup. The given client utilizes the communicated information to generate a ring signature over the corresponding subgroup of clients based on the communicated…
A server is configured to communicate with a group of clients over a network in one embodiment. The server maps the group of clients into a plurality of subgroups of bounded size, communicates to a given one of the clients information identifying the particular subgroup to which that client belongs as well as the other clients in that subgroup. The given client utilizes the communicated information to generate a ring signature over the corresponding subgroup of clients based on the communicated information. The subgroup size may be bounded to a minimum size and a maximum size in accordance with a variable privacy parameter. The server can increase or decrease the value of the parameter in order to provide respective increased or decreased privacy to the clients, by making it respectively more or less difficult to determine which client in a corresponding one of the subgroups produced the received ring signature.
Other inventorsSee patent -
Data-driven alert prioritization
Issued US US9601000 B1
A technique provides alert prioritization. The technique involves selecting attributes to use as alert scoring factors. The technique further involves updating, for an incoming alert having particular attribute values for the selected attributes, count data to represent encounter of the incoming alert from perspectives of the selected attributes. The technique further involves generating an overall significance score for the incoming alert based on the updated count data. The overall…
A technique provides alert prioritization. The technique involves selecting attributes to use as alert scoring factors. The technique further involves updating, for an incoming alert having particular attribute values for the selected attributes, count data to represent encounter of the incoming alert from perspectives of the selected attributes. The technique further involves generating an overall significance score for the incoming alert based on the updated count data. The overall significance score is a measure of alert significance relative to other alerts. Scored alerts then can be sorted so that investigators focus on the alerts with the highest significance scores. Such a technique is well suited for adaptive authentication (AA) and Security Information and Event Management (SIEM) systems among other alert-based systems such as churn analysis systems, malfunction detection systems, and the like.
Other inventorsSee patent -
Information processing systems with security-related feedback
Issued US US 9558346 B1
An information processing system implements a security system. The security system comprises a classifier configured to process information characterizing events in order to generate respective risk scores, and a data store coupled to the classifier and configured to store feedback relating to one or more attributes associated with an assessment of the risk scores by one or more users. The classifier is configured to utilize the feedback regarding the risk scores to learn riskiness of…
An information processing system implements a security system. The security system comprises a classifier configured to process information characterizing events in order to generate respective risk scores, and a data store coupled to the classifier and configured to store feedback relating to one or more attributes associated with an assessment of the risk scores by one or more users. The classifier is configured to utilize the feedback regarding the risk scores to learn riskiness of particular events and to adjust its operation based on the learned riskiness, such that the risk score generated by the classifier for a given one of the events is based at least in part on the feedback received regarding risk scores generated for one or more previous ones of the events.
Other inventorsSee patent -
Method, apparatus and non-transitory processor-readable storage medium for providing security in a computer network
Issued US11223623B1
There are disclosed techniques for use in providing security in a computer network. In one embodiment, the techniques comprise a method including multiple steps. The method comprises receiving user access data characterizing user access with a protected resource within a computer network. The method also comprises evaluating the user access data to extract information therefrom that describes user access with respect to a feature of user access. The method also comprises determining a…
There are disclosed techniques for use in providing security in a computer network. In one embodiment, the techniques comprise a method including multiple steps. The method comprises receiving user access data characterizing user access with a protected resource within a computer network. The method also comprises evaluating the user access data to extract information therefrom that describes user access with respect to a feature of user access. The method also comprises determining a cardinality value in connection with the feature based on the extracted information and a maximum cardinality threshold. It should be appreciated that the cardinality value is limited by the maximum cardinality threshold such that the cardinality value cannot exceed the maximum cardinality threshold. The method also comprises presenting the cardinality value for facilitating fraud detection.
Other inventors -
-
Unsupervised aggregation of security rules
Issued US 9325733
In this disclosure we present an innovative method to automatically handle, prune, and aggregate these huge rules lists. This is applied using data-driven approach which analyzes the cases in which each rule fires, correlate between the different rules alerts, and aggregate rules based on these correlations. This follows the approach of Association Rules which is a common unsupervised method for finding patterns in unlabeled data. We apply similar concepts where the handled objects are rules…
In this disclosure we present an innovative method to automatically handle, prune, and aggregate these huge rules lists. This is applied using data-driven approach which analyzes the cases in which each rule fires, correlate between the different rules alerts, and aggregate rules based on these correlations. This follows the approach of Association Rules which is a common unsupervised method for finding patterns in unlabeled data. We apply similar concepts where the handled objects are rules and their alerts.
Other inventorsSee patent -
Detecting risky domains
Issued US 14501485
There is disclosed a technique for detecting risky domains. The technique comprises collecting information in connection with a domain. The technique also comprises generating a profile comprising at least one metric associated with the domain based on the collected information. The technique further comprises determining the riskiness in connection with the domain based on the generated profile.
Other inventorsSee patent -
Fast-flux detection utilizing domain name system information
Issued US US14471540
-
Detecting risky network communications based on evaluation using normal and abnormal behavior profiles
Issued US US14039881
A technique detects riskiness of a communication in a network based on behavior profiling. The technique involves generating a network history baseline (e.g., normal and abnormal behavior profiles) from prior network communications occurring in the network. The technique further involves, for a new network communication, assigning the new network communication a risk score based on a comparison of the new network communication to the network history baseline. The risk score is a numerical…
A technique detects riskiness of a communication in a network based on behavior profiling. The technique involves generating a network history baseline (e.g., normal and abnormal behavior profiles) from prior network communications occurring in the network. The technique further involves, for a new network communication, assigning the new network communication a risk score based on a comparison of the new network communication to the network history baseline. The risk score is a numerical measure of behavioral normalcy relative to the prior network communications occurring in the network. The technique further involves providing an output signal having a first value when the risk score is above a predefined risk threshold to indicate that the communication is risky, and a second value which is different than the first value when the risk score is below the predefined risk threshold to indicate that the communication is not risky.
Other inventorsSee patent -
Data driven device detection
Issued US 9,130,985
Data driven device detection is provided, whereby a device is detected by obtaining a plurality of feature values for a given device; obtaining a set of device attributes for a plurality of potential devices; calculating a probability value that the given device is each potential device within the plurality of potential devices; identifying a candidate device associated with a maximum probability value among the calculated probability values; and labeling the given device as the candidate…
Data driven device detection is provided, whereby a device is detected by obtaining a plurality of feature values for a given device; obtaining a set of device attributes for a plurality of potential devices; calculating a probability value that the given device is each potential device within the plurality of potential devices; identifying a candidate device associated with a maximum probability value among the calculated probability values; and labeling the given device as the candidate device if the associated maximum probability value satisfies a predefined threshold. The predefined threshold can be a function, for example, of whether the given user has previously used this device. The obtained feature values can be obtained for a selected set of features satisfying one or more predefined characteristic criteria. The device attributes can be obtained, for example, from a profile for each of the plurality of potential devices.
Other inventorsSee patent -
User authentication
Issued US 9122866
There is disclosed some techniques for selecting a user authentication challenge. In one example, the method comprises the steps of receiving an authentication request to authenticate a user and selecting a user authentication challenge to issue to the user in response to receiving the authentication request. The selection of the user authentication challenge comprises selecting a user authentication challenge among a plurality of user authentication challenges based on the cost effectiveness…
There is disclosed some techniques for selecting a user authentication challenge. In one example, the method comprises the steps of receiving an authentication request to authenticate a user and selecting a user authentication challenge to issue to the user in response to receiving the authentication request. The selection of the user authentication challenge comprises selecting a user authentication challenge among a plurality of user authentication challenges based on the cost effectiveness of the respective user authentication challenges and characteristics of the authentication request.
Other inventorsSee patent -
Data-driven detection of servers and clients
Issued US US13832280
An improved technique involves processing network traffic data to automatically establish whether a device on the network satisfies a particular set of constraints. Along these lines, a SIEM server observes and processes incoming and outgoing traffic data corresponding to a particular device at an address of the network. The SIEM server then analyzes this traffic data in order to determine whether the data satisfies a set of constraints satisfied by a client, or another set of constraints…
An improved technique involves processing network traffic data to automatically establish whether a device on the network satisfies a particular set of constraints. Along these lines, a SIEM server observes and processes incoming and outgoing traffic data corresponding to a particular device at an address of the network. The SIEM server then analyzes this traffic data in order to determine whether the data satisfies a set of constraints satisfied by a client, or another set of constraints satisfied by a server. The SIEM server then applies the label of “client” or “server” to the device according to which set of constraints the SIEM server determines the data to have satisfied.
Other inventorsSee patent -
Active learning-based fraud detection in adaptive authentication systems
Issued US 8875267
Active learning-based fraud detection techniques are provided in adaptive authentication systems. An authentication request from an authentication requestor is processed by receiving the authentication request from the authentication requester; comparing current data for the user associated with the user identifier with historical data for the user; generating an adaptive authentication result based on the comparison indicating a likelihood current user data is associated with a fraudulent…
Active learning-based fraud detection techniques are provided in adaptive authentication systems. An authentication request from an authentication requestor is processed by receiving the authentication request from the authentication requester; comparing current data for the user associated with the user identifier with historical data for the user; generating an adaptive authentication result based on the comparison indicating a likelihood current user data is associated with a fraudulent user; and performing one or more additional authentication operations to improve learning if the request satisfies one or more predefined non-risk based criteria. The predefined non-risk based criteria comprises, for example, (i) the request receiving a riskiness score below a threshold based on current data and wherein the request was expected to have a risk score above a threshold, or (ii) the request being in a bucket having a number of tagged events below a threshold.
Other inventorsSee patent -
Similarity-based fraud detection in adaptive authentication systems
Issued US 8,856,923
Similarity-based fraud detection techniques are provided in adaptive authentication systems. A method is provided for determining if an event is fraudulent by obtaining a plurality of tagged events and one or more untagged events, wherein the tagged events indicate a likelihood of whether the corresponding event was fraudulent; constructing a graph, wherein each node in the graph represents an event and has a value representing a likelihood of whether the corresponding event was fraudulent and…
Similarity-based fraud detection techniques are provided in adaptive authentication systems. A method is provided for determining if an event is fraudulent by obtaining a plurality of tagged events and one or more untagged events, wherein the tagged events indicate a likelihood of whether the corresponding event was fraudulent; constructing a graph, wherein each node in the graph represents an event and has a value representing a likelihood of whether the corresponding event was fraudulent and wherein similar transactions are connected via weighted links; diffusing through weights in the graph to assign values to nodes such that neighbors of nodes having non-zero values receive similar values as the neighbors; and classifying whether at least one of the one or more untagged events is fraudulent based on the assigned values.
Other inventorsSee patent -
Managing user access with mobile device posture
Issued US 8,819,769
An improved technique for managing access of a user of a computing machine to a remote network collects device posture information about the user's mobile device. The mobile device runs a soft token, and the collected posture information pertains to various aspects of the mobile device, such as the mobile device's hardware, software, environment, and/or users, for example. The server applies the collected device posture information along with token codes from the soft token in authenticating…
An improved technique for managing access of a user of a computing machine to a remote network collects device posture information about the user's mobile device. The mobile device runs a soft token, and the collected posture information pertains to various aspects of the mobile device, such as the mobile device's hardware, software, environment, and/or users, for example. The server applies the collected device posture information along with token codes from the soft token in authenticating the user to the remote network.
Other inventorsSee patent -
Distributed anonymized communications
Issued US 9015231
A server is configured to communicate with a group of clients over a network. Each of the clients obtains a corresponding informational message comprising security-related information such as an indication of compromise (IOC), inserts noise in the information message to generate an anonymized message, and communicates the anonymized message to the server. The anonymized messages communicated by the respective clients to the server may be configured so as to prevent the server from identifying…
A server is configured to communicate with a group of clients over a network. Each of the clients obtains a corresponding informational message comprising security-related information such as an indication of compromise (IOC), inserts noise in the information message to generate an anonymized message, and communicates the anonymized message to the server. The anonymized messages communicated by the respective clients to the server may be configured so as to prevent the server from identifying any individual client associated with a particular one of the anonymized messages, while also allowing the server to extract from the anonymized messages collectively one or more characteristics of the underlying informational messages. A given client may insert noise in an informational message by, for example, selecting a noise value from a specified range of noise values, and combining the informational message and the selected noise value to generate the anonymized message.
Other inventorsSee patent -
Fast speaker hunting in lawful interception systems
Issued US US 20120155663 A1
A method for spotting an interaction in which a target speaker associated with a current index or current interaction speaks, the method comprising: receiving an interaction and an index associated with the interaction, the index associated with additional data; receiving the current interaction or current index associated with the target speaker; obtaining current data associated with the current interaction or current index; filtering the index using the additional data, in accordance with…
A method for spotting an interaction in which a target speaker associated with a current index or current interaction speaks, the method comprising: receiving an interaction and an index associated with the interaction, the index associated with additional data; receiving the current interaction or current index associated with the target speaker; obtaining current data associated with the current interaction or current index; filtering the index using the additional data, in accordance with the current data associated with the current interaction or current index, and obtaining a matching index; and comparing the current index or a representation of the current interaction with the matching index to obtain a target speaker index.
Other inventorsSee patent
Honors & Awards
-
Excellence scholarship from the Rabinovich fund
The Rabinovich fund
-
Outstanding Assistant Lecturer
Tel-Aviv University
-
Outstanding Assistant Lecturer
Tel-Aviv university
Languages
-
Hebrew
-
-
English
-
Recommendations received
1 person has recommended Eyal
Join now to viewMore activity by Eyal
-
🗣 Looking for excellent PhD candidates 👩🎓 to work with us on LLMs as part of a Summer internship with MSR @ Cambridge. Internship starts Q2 2024.…
🗣 Looking for excellent PhD candidates 👩🎓 to work with us on LLMs as part of a Summer internship with MSR @ Cambridge. Internship starts Q2 2024.…
Liked by Eyal Kolman
-
I know many of you look at what's going on in Gaza/Israel and wonder what's going on. I am not going to answer that, as I guess you all by now know…
I know many of you look at what's going on in Gaza/Israel and wonder what's going on. I am not going to answer that, as I guess you all by now know…
Liked by Eyal Kolman
-
לא מה שתכננתי, ובכלל לא מה שדמיינתי לפני כמה חודשים החלטתי לקחת הפסקונת, קטנה כזאת, אחרי 15 שנה כשכירה, ולדייק מה בדיוק אני מחפשת בתפקיד הבא. לרגע לא…
לא מה שתכננתי, ובכלל לא מה שדמיינתי לפני כמה חודשים החלטתי לקחת הפסקונת, קטנה כזאת, אחרי 15 שנה כשכירה, ולדייק מה בדיוק אני מחפשת בתפקיד הבא. לרגע לא…
Liked by Eyal Kolman
-
It’s often difficult to grasp how a small country in the Middle East has become a powerhouse of innovation and a global tech leader. But it didn’t…
It’s often difficult to grasp how a small country in the Middle East has become a powerhouse of innovation and a global tech leader. But it didn’t…
Liked by Eyal Kolman
-
I’m happy to share that I’ve completed my PhD at Weizmann Institute of Science!
I’m happy to share that I’ve completed my PhD at Weizmann Institute of Science!
Liked by Eyal Kolman
Other similar profiles
-
Irad Ben-Gal
Connect -
Shuki Cohen
Connect -
Asi Messica
Connect -
Yasmin Bokobza
Connect -
shay gorman
--
Connect -
Shay Groman
Civil engineering Technion student seeking full time summer position
Connect -
Roman Dzouraev
Senior Team Leader, Software Engineer & Solution Architect
Connect -
Nir Dzouraev
Software and Information Systems Engineering Graduate from Ben-Gurion University of the Negev
Connect -
Jacob Amsalem
Software Engineer at F5 Networks
Connect -
Karin Lisha
Software Engineer at ELTA Systems Ltd
Connect
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Eyal Kolman
1 other named Eyal Kolman is on LinkedIn
See others named Eyal Kolman