AI & ML in Cyber Security - Why Algorithms Are Dangerous
Offered By: Black Hat via YouTube
Course Description
Overview
Syllabus
Intro
RAFFAEL MARTY
OUTLINE
ML AND AI - WHAT IS IT? MACHINE LEARNING Algorithmic ways to describe data Supervised
MACHINE LEARNING USES IN SECURITY
FAMOUS AI (ALGORITHM) FAILURES
WHAT MAKES ALGORITHMS DANGEROUS? ALGORITHMS MAKE ASSUMPTIONS ABOUT THE DATA
COGNITIVE BIASES
THE DANGERS WITH DEEP LEARNING - WHEN NOT TO USE IT
ADVERSARIAL MACHINE LEARNING
DEEP LEARNING - THE SOLUTION TO EVERYTHING
UNSUPERVISED TO THE RESCUE?
UNDERSTAND AND CLEAN THE DATA
ENGINEERING DISTANCE FUNCTIONS
CHOOSING THE RIGHT UNSUPERVISED ALGORITHM
CHOOSING THE CORRECT ALGORITHM PARAMETERS
INTERPRETING THE DATA
A DIFFERENT APPROACH - PROBABILISTIC INFERENCE Rather than running algorithms the model the shape of data, we need to take expert knowledge/ domain expertise into account
ST STEP-BUILD THE GRAPH
ND STEP - GROUP NODES
RD STEP - INTRODUCE DEPENDENCIES
TH STEP - ESTIMATE PROBABILITIES
TH STEP-GOAL COMPUTATION
TH STEP-OBSERVE ACTIVITIES
TH STEP-EXPERT INPUT Strengthen the network by introducing expert knowledge
BELIEF NETWORKS - SOME OBSERVATIONS
Taught by
Black Hat
Related Courses
Artificial IntelligenceMassachusetts Institute of Technology via MIT OpenCourseWare Bayesian Networks 2 - Forward-Backward - Stanford CS221: AI
Stanford University via YouTube Bayesian Networks 1 - Inference - Stanford CS221: AI
Stanford University via YouTube Probabilistic Scripts for Automating Common-Sense Tasks
Strange Loop Conference via YouTube Steps Toward Robust Artificial Intelligence - Thomas G Dietterich, Oregon State University
Alan Turing Institute via YouTube