Distillation of Deepnets
Training modern deepnets can take an inordinate amount of time even with the best GPU hardware available. Inception-3 on ImageNet 1000 using 8 NVIDIA Tesla… Read More »Distillation of Deepnets
Training modern deepnets can take an inordinate amount of time even with the best GPU hardware available. Inception-3 on ImageNet 1000 using 8 NVIDIA Tesla… Read More »Distillation of Deepnets
Pentesting tools like Metasploit, Burp, ExploitPack, BeEF, etc. are used by security practitioners to identify possible vulnerability points and to assess compliance with security policies. Pentesting tools come… Read More »Probabilistic Pentesting
The honeypot is a method of cybersecurity in which a bait (‘honey’) system/network is designed to emulate or act as a real system/network to divert… Read More »Honeypot Turing Test
Financial institutions have a regulatory requirement to monitor account activity for anti-money laundering (AML). Regulators take the monitoring and reporting requirements very seriously as evidenced… Read More »Detecting Money Laundering with Unsupervised ML
Machine learning is being used in a variety of domains to restrict or prevent undesirable behaviors by hackers, fraudsters and even ordinary users. Algorithms deployed… Read More »Formulation of Adversarial ML