Distillation of Deepnets

Distillation of Deepnets

Training modern deepnets can take an inordinate amount of time even with the best GPU hardware available. Inception-3 on ImageNet 1000 using 8 NVIDIA Tesla K40s takes about 2 weeks (Google Research Blog).

One way to keep the predictive accuracy of a large network but reduce the number of its parameters, is a training paradigm called "distillation". 

Deep Learning Approach to Fraud

Deep Learning Approach to Fraud

When creating a feature space for adversarial use cases like payment fraud, account takeover fraud and internal fraud, data scientists can rely on domain knowledge, intuition, personal experience and ultimately and if labeled data is available-variable selection.

Often the objective of constructing such feature spaces is to do anomaly / outlier detection by capturing enough attributes and aggregates that can delineate normal and extraordinary user behavior.

Applying ML to InfoSec

Applying ML to InfoSec

There seems to be very little overlap currently between the worlds of infosec and machine learning. If a data scientist attended Black Hat and a network security expert went to NIPS, they would be equally at a loss. 

This is unfortunate because infosec can definitely benefit from a probabilistic approach but a significant amount of domain expertise is required in order to apply ML methods.

Detecting Money Laundering

Detecting Money Laundering

Financial institutions have a regulatory requirement to monitor account activity for anti-money laundering (AML). Regulators take the monitoring and reporting requirements very seriously as evidenced by a recent set of FinCEN fines.  

One challenge with AML is that it rarely manifests as the activity of a single person, business, account, or a transaction. Therefore detection requires behavioral pattern analysis of transactions occurring over time and involving a set of (not obviously) related real-world entities.

Formulation of Adversarial ML

Formulation of Adversarial ML

Machine learning is being used in a variety of domains to restrict or prevent undesirable behaviors by hackers, fraudsters and even ordinary users.  Algorithms deployed for fraud prevention, network security, anti-money laundering belong to the broad area of adversarial machine learning where instead of ML trying to learn the patterns of benevolent nature, it is confronted with a malicious adversary that is looking for opportunities to exploit loopholes and weaknesses for personal gain.