SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
1
C
ouncilofInform
ation
Security
Getting closer to
BEGINNER’S SERIES – PART 1
BY MILAN
2
C
ouncilofInform
ation
Security
What’s the Agenda?
 Clearing our Basics
 Understanding AI ML DL
 There is more to it
 Setting up your Weapon
 Understand your Weapon
 Know the Libraries
 Run the Code
 What you want next?
3
C
ouncilofInform
ation
Security
Know your Trainer 4
Milan Singh Thakur
 Artificial Intelligence & Machine Learning Evangelist
 Executive Director – Future Technologies with CIS
 OWASP Mobile Project Global Leader
 International speaker, trainer, learner
C
ouncilofInform
ation
Security
What is the Confusion? 5
 Where to start from?
 Which course is better?
 Should I take online/offline training?
 Which direction will it take my career?
 Do I need to work with lot of math?
 Do I need to be a programmer?
 Will my colleagues understand what I am doing?
C
ouncilofInform
ation
Security
6
C
ouncilofInform
ation
Security
AI, ML and DL..??
Artificial
Intelligence
Machine
Learning
Deep Learning
7
C
ouncilofInform
ation
Security
Why to use ML now?
 Too much of data available
 Computational power is increasing
 Algorithmic research is breaking innovation barriers
 Increasing support and interest of industries
 ML + Cyber Security is, “The Endless Game”
 IoT and IIoT needs to be smarter
 Hackers have weaponized ML, when will you?
8
C
ouncilofInform
ation
Security
Applications of ML 9
C
ouncilofInform
ation
Security
10
C
ouncilofInform
ation
Security
Ex: Spam Filter using ML 11
C
ouncilofInform
ation
Security
Ex: Static Malware Analysis using ML 12
C
ouncilofInform
ation
Security
Check if you are “Still Awake” 13
 I want to calculate my share value. Which category?
 I want to understand what my customers are expecting in next
product?
 My defense system drone has to identify the enemy and execute?
 My bank detects ATM fraud very quickly, how?
 Face unlock on my mobile?
C
ouncilofInform
ation
Security
Leveraging ML in Industry
 Predictive maintenance
 Demand forecasting
 Workforce management
 Consumer buying patterns and recommendations
 Device monitoring, incident reporting, advanced analytics
 Airbus has launched “Factory of Future” – a Boeing creates nearly half
terabyte data during every flight
 Bentley uses it for quality vs customer satisfaction prediction
 IBM Watson is extensively used in Healthcare industry for patient data
analysis, diagnostics and help doctors for decision making
14
C
ouncilofInform
ation
Security
How you can get into Machine Learning?
 Get into basic courses by Andrew NG
 Install jupyter notebook – it has all you need (Yolo, PIL, pandas, sk-learn
& more)
 Run sample code: iris flower, object detection
 Understand you data
 Understand how labelling of data is done
 Look into how noise is removed
 Be wise to choose right algorithm
 Validate the output
15
C
ouncilofInform
ation
Security
Setting up you environment
 http://jupyter.org/install
 Download and install Anaconda with python3
 Download and install jupyter notebook
 Start the notebook server
 $Jupyter notebook
 Visit http://localhost:8888 for Notebook dashboard
16
C
ouncilofInform
ation
Security
Understanding Jupyter Notebook Dash
 Demo 
17
C
ouncilofInform
ation
Security
What Libraries to focus on?
 TensorFlow:
 Originally developed by researchers and engineers from the Google
Brain team within Google’s AI organization, it comes with strong support
for machine learning and deep learning and the flexible numerical
computation core is used across many other scientific domains.
 Numpy:
 Primarily used for scientific computing, has a powerful N-dimensional
array object, useful linear algebra, Fourier transform, and random
number capabilities
 OpenCV:
 Multi-core processing, hardware acceleration, real-time applications
Usage ranges from interactive art, to mines inspection, stitching maps
on the web or through advanced robotics
18
C
ouncilofInform
ation
Security
 Pandas:
 Library providing high-performance, easy-to-use data structures and
data analysis tools for the Python programming language
 PIL – Pilow
 The Python Imaging Library adds image processing capabilities to your
Python interpreter
 Yolo:
 You Only Look Once (YOLO), real-time object detection system based
on a Pascal Titan X it processes images at 30 FPS and has a mAP of
57.9% on COCO test-dev
 Scikit-learn:
 Simple and efficient tools for data mining and data analysis, Accessible
to everybody and reusable in various contexts. Built on NumPy, SciPy,
and matplotlib
 StatsModels
 matplotlib
19
C
ouncilofInform
ation
Security
What are my Algorithms? 20
Classification
SVM
Nearest
Neighbors
Random
Forest
Regression
SVR
Ridge
Regression
Clustering
K-Means
Spectral
Clustering
Mean shift
Dimensionality
Reduction
PCA
Feature
selection
Non-negative
matrix
factorization
Model
Selection
Grid search
Cross
validation
metrics
Preprocessing
Preprocessing
Feature
extraction
C
ouncilofInform
ation
Security
Run Run Run…!!
 Let’s run our first code of ML 
 See Object detection video using Yolo
21
C
ouncilofInform
ation
Security
What’s in Next Session (Part 2)…!!
 Jumping into Libraries
 Writing code for object detection
 Natural Language Processing (NLP)
 Neural Networks
 SVM
 Deep dive into Algorithms
 Decision Trees and Forests
22
C
ouncilofInform
ation
Security
“
”
A Vision to Secure the
Nation
COUNCIL OF INFORMATION SECURITY
Thank you for being part of this session. Your participation and feedback is
valuable for us.
Email us at: info@aimlglobal.org
23
C
ouncilofInform
ation
Security

Más contenido relacionado

La actualidad más candente (6)

Smart Augmented Fields for Emergency Operations
Smart Augmented Fields for Emergency OperationsSmart Augmented Fields for Emergency Operations
Smart Augmented Fields for Emergency Operations
 
OA_Cyber security course with AI
OA_Cyber security course with AIOA_Cyber security course with AI
OA_Cyber security course with AI
 
ABSTRACTCONTENTABRIVIATION
ABSTRACTCONTENTABRIVIATIONABSTRACTCONTENTABRIVIATION
ABSTRACTCONTENTABRIVIATION
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
NIPS - Deep learning @ Edge using Intel's NCS
NIPS - Deep learning @ Edge using Intel's NCSNIPS - Deep learning @ Edge using Intel's NCS
NIPS - Deep learning @ Edge using Intel's NCS
 
Artificial intelligence in cyber defense
Artificial intelligence in cyber defenseArtificial intelligence in cyber defense
Artificial intelligence in cyber defense
 

Similar a CIS AIML Beginners Series Part 1

Similar a CIS AIML Beginners Series Part 1 (20)

introductiontotinyml-solomonmuhunyogithu-230608174720-8f1bc8e4.pptx
introductiontotinyml-solomonmuhunyogithu-230608174720-8f1bc8e4.pptxintroductiontotinyml-solomonmuhunyogithu-230608174720-8f1bc8e4.pptx
introductiontotinyml-solomonmuhunyogithu-230608174720-8f1bc8e4.pptx
 
Introduction to TinyML - Solomon Muhunyo Githu
Introduction to TinyML - Solomon Muhunyo GithuIntroduction to TinyML - Solomon Muhunyo Githu
Introduction to TinyML - Solomon Muhunyo Githu
 
Artificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurityArtificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurity
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
 
Merge PPT G3 and G4.pptx
Merge PPT G3 and G4.pptxMerge PPT G3 and G4.pptx
Merge PPT G3 and G4.pptx
 
Webinar: Machine Learning para Microcontroladores
Webinar: Machine Learning para MicrocontroladoresWebinar: Machine Learning para Microcontroladores
Webinar: Machine Learning para Microcontroladores
 
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
 
The Cognitive Era in Manufacturing and Supply Chain by Thorsten Schroeer
The Cognitive Era in Manufacturing and Supply Chain by Thorsten SchroeerThe Cognitive Era in Manufacturing and Supply Chain by Thorsten Schroeer
The Cognitive Era in Manufacturing and Supply Chain by Thorsten Schroeer
 
M2M Summit 2016 - IBM Presentation Cognitive Manufacturing
M2M Summit 2016 - IBM Presentation Cognitive ManufacturingM2M Summit 2016 - IBM Presentation Cognitive Manufacturing
M2M Summit 2016 - IBM Presentation Cognitive Manufacturing
 
Arduino in TinyML with Edge Impulse
Arduino in TinyML with Edge ImpulseArduino in TinyML with Edge Impulse
Arduino in TinyML with Edge Impulse
 
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
 
Artificial Intelligence (2016) - AMP New Ventures
Artificial Intelligence (2016) - AMP New VenturesArtificial Intelligence (2016) - AMP New Ventures
Artificial Intelligence (2016) - AMP New Ventures
 
Ways You Can Use Python For Cybersecurity - AppsDevPro
Ways You Can Use Python For Cybersecurity - AppsDevPro Ways You Can Use Python For Cybersecurity - AppsDevPro
Ways You Can Use Python For Cybersecurity - AppsDevPro
 
demo AI ML.pptx
demo AI ML.pptxdemo AI ML.pptx
demo AI ML.pptx
 
What if Things Start to Think - Artificial Intelligence in IoT
What if Things Start to Think - Artificial Intelligence in IoTWhat if Things Start to Think - Artificial Intelligence in IoT
What if Things Start to Think - Artificial Intelligence in IoT
 
Ai for life sciences - are we ready
Ai for life sciences  - are we readyAi for life sciences  - are we ready
Ai for life sciences - are we ready
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
"Imaging + AI: Opportunities Inside the Car and Beyond," a Presentation from ...
"Imaging + AI: Opportunities Inside the Car and Beyond," a Presentation from ..."Imaging + AI: Opportunities Inside the Car and Beyond," a Presentation from ...
"Imaging + AI: Opportunities Inside the Car and Beyond," a Presentation from ...
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

CIS AIML Beginners Series Part 1

  • 2. Getting closer to BEGINNER’S SERIES – PART 1 BY MILAN 2 C ouncilofInform ation Security
  • 3. What’s the Agenda?  Clearing our Basics  Understanding AI ML DL  There is more to it  Setting up your Weapon  Understand your Weapon  Know the Libraries  Run the Code  What you want next? 3 C ouncilofInform ation Security
  • 4. Know your Trainer 4 Milan Singh Thakur  Artificial Intelligence & Machine Learning Evangelist  Executive Director – Future Technologies with CIS  OWASP Mobile Project Global Leader  International speaker, trainer, learner C ouncilofInform ation Security
  • 5. What is the Confusion? 5  Where to start from?  Which course is better?  Should I take online/offline training?  Which direction will it take my career?  Do I need to work with lot of math?  Do I need to be a programmer?  Will my colleagues understand what I am doing? C ouncilofInform ation Security
  • 7. AI, ML and DL..?? Artificial Intelligence Machine Learning Deep Learning 7 C ouncilofInform ation Security
  • 8. Why to use ML now?  Too much of data available  Computational power is increasing  Algorithmic research is breaking innovation barriers  Increasing support and interest of industries  ML + Cyber Security is, “The Endless Game”  IoT and IIoT needs to be smarter  Hackers have weaponized ML, when will you? 8 C ouncilofInform ation Security
  • 9. Applications of ML 9 C ouncilofInform ation Security
  • 11. Ex: Spam Filter using ML 11 C ouncilofInform ation Security
  • 12. Ex: Static Malware Analysis using ML 12 C ouncilofInform ation Security
  • 13. Check if you are “Still Awake” 13  I want to calculate my share value. Which category?  I want to understand what my customers are expecting in next product?  My defense system drone has to identify the enemy and execute?  My bank detects ATM fraud very quickly, how?  Face unlock on my mobile? C ouncilofInform ation Security
  • 14. Leveraging ML in Industry  Predictive maintenance  Demand forecasting  Workforce management  Consumer buying patterns and recommendations  Device monitoring, incident reporting, advanced analytics  Airbus has launched “Factory of Future” – a Boeing creates nearly half terabyte data during every flight  Bentley uses it for quality vs customer satisfaction prediction  IBM Watson is extensively used in Healthcare industry for patient data analysis, diagnostics and help doctors for decision making 14 C ouncilofInform ation Security
  • 15. How you can get into Machine Learning?  Get into basic courses by Andrew NG  Install jupyter notebook – it has all you need (Yolo, PIL, pandas, sk-learn & more)  Run sample code: iris flower, object detection  Understand you data  Understand how labelling of data is done  Look into how noise is removed  Be wise to choose right algorithm  Validate the output 15 C ouncilofInform ation Security
  • 16. Setting up you environment  http://jupyter.org/install  Download and install Anaconda with python3  Download and install jupyter notebook  Start the notebook server  $Jupyter notebook  Visit http://localhost:8888 for Notebook dashboard 16 C ouncilofInform ation Security
  • 17. Understanding Jupyter Notebook Dash  Demo  17 C ouncilofInform ation Security
  • 18. What Libraries to focus on?  TensorFlow:  Originally developed by researchers and engineers from the Google Brain team within Google’s AI organization, it comes with strong support for machine learning and deep learning and the flexible numerical computation core is used across many other scientific domains.  Numpy:  Primarily used for scientific computing, has a powerful N-dimensional array object, useful linear algebra, Fourier transform, and random number capabilities  OpenCV:  Multi-core processing, hardware acceleration, real-time applications Usage ranges from interactive art, to mines inspection, stitching maps on the web or through advanced robotics 18 C ouncilofInform ation Security
  • 19.  Pandas:  Library providing high-performance, easy-to-use data structures and data analysis tools for the Python programming language  PIL – Pilow  The Python Imaging Library adds image processing capabilities to your Python interpreter  Yolo:  You Only Look Once (YOLO), real-time object detection system based on a Pascal Titan X it processes images at 30 FPS and has a mAP of 57.9% on COCO test-dev  Scikit-learn:  Simple and efficient tools for data mining and data analysis, Accessible to everybody and reusable in various contexts. Built on NumPy, SciPy, and matplotlib  StatsModels  matplotlib 19 C ouncilofInform ation Security
  • 20. What are my Algorithms? 20 Classification SVM Nearest Neighbors Random Forest Regression SVR Ridge Regression Clustering K-Means Spectral Clustering Mean shift Dimensionality Reduction PCA Feature selection Non-negative matrix factorization Model Selection Grid search Cross validation metrics Preprocessing Preprocessing Feature extraction C ouncilofInform ation Security
  • 21. Run Run Run…!!  Let’s run our first code of ML   See Object detection video using Yolo 21 C ouncilofInform ation Security
  • 22. What’s in Next Session (Part 2)…!!  Jumping into Libraries  Writing code for object detection  Natural Language Processing (NLP)  Neural Networks  SVM  Deep dive into Algorithms  Decision Trees and Forests 22 C ouncilofInform ation Security
  • 23. “ ” A Vision to Secure the Nation COUNCIL OF INFORMATION SECURITY Thank you for being part of this session. Your participation and feedback is valuable for us. Email us at: info@aimlglobal.org 23 C ouncilofInform ation Security