Introduction to Weakly Supervised Learning
Supervised Machine Learning relies on labelled data that consists of data and pairs of expected outputs. For example an image of dog that is labelled a dog. ...
Look at these two images
You can clearly distinguish what a Gibbon and a panda are. Even Convolution Neural Networks (CNN) can :) . There seems like no problem except we would like it to make the neural network prediction as confident as possible. Now look at these two images do you notice any difference?
Now it gets scary when your model predicts this slightly perturbated image of a panda as a gibbon with 99.3% confidence and predicts the original image as a panda with just 55% confidence. We term these as adversial examples , which has questioned the fundamental aspects of what neural networks actually learn and their capabilities. This can be especially dangerous considering how widespread neural networks are.
This was first discovered by Christian Szegedy in 2014
The upside of adversial examples are they can be used as training data making your neural networks generalize better.
I will show you a pytorch implementating of adversial examples and other possible adversial attacks in another tutorial
Supervised Machine Learning relies on labelled data that consists of data and pairs of expected outputs. For example an image of dog that is labelled a dog. ...
Training neural networks for a single task requires several thousands of examples for a each class when training a model from scratch. This is typically not ...
Conventionally pandas allows you to analyze datasets that are present locally on your PC , that is when you are given access to a given dataset. But , there...
In conventional machine learning we train an algorithm on input/output pairs (Supervised learning) or only on raw data(Unsupervised learning) and make predic...
Conventional machine learning required the practitioner to manually look at images/text and handcraft appropriate features. Deep Learning models are powerful...
Having gone through the importance of differential privacy and its definition , this article motivates the theory with a practical example to make it more in...
Personal data is a personal valuable asset , it could be used for economic , social or even malicious benifits. Most internet companies survive on personal d...