SlideShare una empresa de Scribd logo
1 de 18
Descargar para leer sin conexión
Overview
● Brief Skymind Intro
● Deep Learning outside research
● Core trends for ROI in deep learning
● Anomaly Detection with deep learning
● Simbox fraud detection for telco
● Network Intrusion
● Fintech securities churn prediction
● Real time corporate campus security: Detecting
dangerous objects
Distributed Deep
RL on Spark
We built
Deeplearning4j
SKYMIND INTELLIGENCE LAYER (SKIL)
REFERENCE ARCHITECTURE
Deep Learning
outside research
● Too much hype
● Most companies rarely do machine learning let
alone deep learning
● Beginners try to jump to deep learning after
andrew ng’s coursera class without first
principles
This is not deep learning.
This is deep
learning.
Deep Learning
outside research
● Mostly python and r on kaggle
● Many learning from udacity
● Most deep learning is research stage/enthusiast
● Salaried engineers doing DL mostly publishing
papers
● Large fight for talent (see google fellowship)
Deep Learning
outside research
● Deep Learning hasn’t penetrated the fortune
2000
● Fortune 2000 wants ROI not cat pictures
● Many organizations just NOW starting to take
software seriously let alone data science
● Use cases for deep learning still not widely
understood
● Large fight for talent (see google fellowship)
Core trends for
ROI in DL
● Mostly funded by adtech companies
● Companies doing DL have data from lots of
media data (audio,image,video)
● Many companies using DL for ad targeting
● Best use cases are targeting understanding large
scale hidden patterns in data (often cross
domain)
● Time series has largely been ignored
Core trends for
ROI in DL
● Initial first attempts at deep learning following
papers (no other examples)
● Many companies end up sticking to simpler
techniques after trying DL
● Expectations for DL tend to match hype not
reality
● Some rare cases exist outside this trend (mainly
in asia)
Core trends for
ROI in DL
For more trends
see:
https://www.oreilly.c
om/ideas/the-curren
t-state-of-machine-i
ntelligence-3-0
Anomaly
Detection
● “Find the needle in the haystack”
● “Find the bad guy”
● “The machines about to break!”
● “Find the next market rally”
● “Take action on said anomaly”
Anomaly
Detection with
deep learning
● Both unsupervised and supervised techniques
● LSTMs (time series neural net)
● Autoencoders (unsupervised)
● Expectations for DL tend to match hype not
reality
● Some rare cases exist outside this trend (mainly
in asia)
LSTM
AutoEncoder
Simbox fraud for
telco
● Costs telco over 3 billion yearly
● Route calls for free over a carrier network
● Need to mine raw call detail records to find
● Find and cluster fraudulent CDRs with
autoencoders (unsupervised)
● Beats current rules and supervised based
approaches
Network
Intrusion
● Raw web log traffic
● Detect attacks at points of origin
● Typically supervised learning
● Goal: Classify raw time series to find attacks
● Optional: Detect *kind* of attack
Fintech
securities churn
prediction
● Predict when user is going to leave
service
● Using recurrent nets find likelihood of leaving
● Using lift curves identify budget for sending
discounts to percentage of users “worth” saving
● Optional: use autoencoders with kmeans to
identify groups of users wanting to leave
Corporate
campus security
● At 30 FPS or more find dangerous objects in a
crowd
● Identify a target object and send immediate
report
● Uses variants of Convolutional nets
● Imagine hooking this up to a real camera
Conclusion
● Deep Learning still young
● Many use cases not being tried
● Research is moving faster every year
● Talent still hard to find
● Will become more common with time
Wrangleconf Big Data Malaysia 2016

Más contenido relacionado

Destacado

Dimensionality Reduction of Genomic Variation with Big Data Genomics ADAM & S...
Dimensionality Reduction of Genomic Variation with Big Data Genomics ADAM & S...Dimensionality Reduction of Genomic Variation with Big Data Genomics ADAM & S...
Dimensionality Reduction of Genomic Variation with Big Data Genomics ADAM & S...Deborah Siegel
 
Open and Proprietary Data Economies in Malaysia: The Consumption Perspective
Open and Proprietary Data Economies in Malaysia: The Consumption PerspectiveOpen and Proprietary Data Economies in Malaysia: The Consumption Perspective
Open and Proprietary Data Economies in Malaysia: The Consumption PerspectiveSandra Hanchard
 
The 101 Of Web 2.0 by Roslan Bakri Zakariah
The 101 Of Web 2.0 by Roslan Bakri ZakariahThe 101 Of Web 2.0 by Roslan Bakri Zakariah
The 101 Of Web 2.0 by Roslan Bakri ZakariahIdeashare
 
Productionizing dl from the ground up
Productionizing dl from the ground upProductionizing dl from the ground up
Productionizing dl from the ground upAdam Gibson
 
Hadoop summit 2016
Hadoop summit 2016Hadoop summit 2016
Hadoop summit 2016Adam Gibson
 
DataGraft: Data-as-a-Service for Open Data
DataGraft: Data-as-a-Service for Open DataDataGraft: Data-as-a-Service for Open Data
DataGraft: Data-as-a-Service for Open Datadapaasproject
 
Malaysia Big Data Analytics Initiative: 2015 Imperatives
Malaysia Big Data Analytics Initiative: 2015 ImperativesMalaysia Big Data Analytics Initiative: 2015 Imperatives
Malaysia Big Data Analytics Initiative: 2015 ImperativesPeter Kua
 
Recurrent nets and sensors
Recurrent nets and sensorsRecurrent nets and sensors
Recurrent nets and sensorsAdam Gibson
 
Deep learning with Hortonworks and Apache Spark - Hortonworks technical workshop
Deep learning with Hortonworks and Apache Spark - Hortonworks technical workshopDeep learning with Hortonworks and Apache Spark - Hortonworks technical workshop
Deep learning with Hortonworks and Apache Spark - Hortonworks technical workshopHortonworks
 
Future of ai on the jvm
Future of ai on the jvmFuture of ai on the jvm
Future of ai on the jvmAdam Gibson
 
Anomaly Detection in Deep Learning (Updated)
Anomaly Detection in Deep Learning (Updated)Anomaly Detection in Deep Learning (Updated)
Anomaly Detection in Deep Learning (Updated)Adam Gibson
 
The Enterprise and Connected Data, Trends in the Apache Hadoop Ecosystem by A...
The Enterprise and Connected Data, Trends in the Apache Hadoop Ecosystem by A...The Enterprise and Connected Data, Trends in the Apache Hadoop Ecosystem by A...
The Enterprise and Connected Data, Trends in the Apache Hadoop Ecosystem by A...Big Data Spain
 
Strata Beijing - Deep Learning in Production on Spark
Strata Beijing - Deep Learning in Production on SparkStrata Beijing - Deep Learning in Production on Spark
Strata Beijing - Deep Learning in Production on SparkAdam Gibson
 
H2O World - Top 10 Deep Learning Tips & Tricks - Arno Candel
H2O World - Top 10 Deep Learning Tips & Tricks - Arno CandelH2O World - Top 10 Deep Learning Tips & Tricks - Arno Candel
H2O World - Top 10 Deep Learning Tips & Tricks - Arno CandelSri Ambati
 
August 2016 HUG: Open Source Big Data Ingest with StreamSets Data Collector
August 2016 HUG: Open Source Big Data Ingest with StreamSets Data Collector August 2016 HUG: Open Source Big Data Ingest with StreamSets Data Collector
August 2016 HUG: Open Source Big Data Ingest with StreamSets Data Collector Yahoo Developer Network
 
Suneel Marthi - Deep Learning with Apache Flink and DL4J
Suneel Marthi - Deep Learning with Apache Flink and DL4JSuneel Marthi - Deep Learning with Apache Flink and DL4J
Suneel Marthi - Deep Learning with Apache Flink and DL4JFlink Forward
 
August 2016 HUG: Better together: Fast Data with Apache Spark™ and Apache Ign...
August 2016 HUG: Better together: Fast Data with Apache Spark™ and Apache Ign...August 2016 HUG: Better together: Fast Data with Apache Spark™ and Apache Ign...
August 2016 HUG: Better together: Fast Data with Apache Spark™ and Apache Ign...Yahoo Developer Network
 
Dynamic and Static Modeling
Dynamic and Static ModelingDynamic and Static Modeling
Dynamic and Static ModelingSaurabh Kumar
 

Destacado (20)

Dimensionality Reduction of Genomic Variation with Big Data Genomics ADAM & S...
Dimensionality Reduction of Genomic Variation with Big Data Genomics ADAM & S...Dimensionality Reduction of Genomic Variation with Big Data Genomics ADAM & S...
Dimensionality Reduction of Genomic Variation with Big Data Genomics ADAM & S...
 
Open and Proprietary Data Economies in Malaysia: The Consumption Perspective
Open and Proprietary Data Economies in Malaysia: The Consumption PerspectiveOpen and Proprietary Data Economies in Malaysia: The Consumption Perspective
Open and Proprietary Data Economies in Malaysia: The Consumption Perspective
 
The 101 Of Web 2.0 by Roslan Bakri Zakariah
The 101 Of Web 2.0 by Roslan Bakri ZakariahThe 101 Of Web 2.0 by Roslan Bakri Zakariah
The 101 Of Web 2.0 by Roslan Bakri Zakariah
 
Productionizing dl from the ground up
Productionizing dl from the ground upProductionizing dl from the ground up
Productionizing dl from the ground up
 
Hadoop summit 2016
Hadoop summit 2016Hadoop summit 2016
Hadoop summit 2016
 
DataGraft: Data-as-a-Service for Open Data
DataGraft: Data-as-a-Service for Open DataDataGraft: Data-as-a-Service for Open Data
DataGraft: Data-as-a-Service for Open Data
 
Malaysia Big Data Analytics Initiative: 2015 Imperatives
Malaysia Big Data Analytics Initiative: 2015 ImperativesMalaysia Big Data Analytics Initiative: 2015 Imperatives
Malaysia Big Data Analytics Initiative: 2015 Imperatives
 
Recurrent nets and sensors
Recurrent nets and sensorsRecurrent nets and sensors
Recurrent nets and sensors
 
Deep learning with Hortonworks and Apache Spark - Hortonworks technical workshop
Deep learning with Hortonworks and Apache Spark - Hortonworks technical workshopDeep learning with Hortonworks and Apache Spark - Hortonworks technical workshop
Deep learning with Hortonworks and Apache Spark - Hortonworks technical workshop
 
Future of ai on the jvm
Future of ai on the jvmFuture of ai on the jvm
Future of ai on the jvm
 
Deep Learning using Spark and DL4J for fun and profit
Deep Learning using Spark and DL4J for fun and profitDeep Learning using Spark and DL4J for fun and profit
Deep Learning using Spark and DL4J for fun and profit
 
Anomaly Detection in Deep Learning (Updated)
Anomaly Detection in Deep Learning (Updated)Anomaly Detection in Deep Learning (Updated)
Anomaly Detection in Deep Learning (Updated)
 
The Enterprise and Connected Data, Trends in the Apache Hadoop Ecosystem by A...
The Enterprise and Connected Data, Trends in the Apache Hadoop Ecosystem by A...The Enterprise and Connected Data, Trends in the Apache Hadoop Ecosystem by A...
The Enterprise and Connected Data, Trends in the Apache Hadoop Ecosystem by A...
 
Strata Beijing - Deep Learning in Production on Spark
Strata Beijing - Deep Learning in Production on SparkStrata Beijing - Deep Learning in Production on Spark
Strata Beijing - Deep Learning in Production on Spark
 
H2O World - Top 10 Deep Learning Tips & Tricks - Arno Candel
H2O World - Top 10 Deep Learning Tips & Tricks - Arno CandelH2O World - Top 10 Deep Learning Tips & Tricks - Arno Candel
H2O World - Top 10 Deep Learning Tips & Tricks - Arno Candel
 
August 2016 HUG: Open Source Big Data Ingest with StreamSets Data Collector
August 2016 HUG: Open Source Big Data Ingest with StreamSets Data Collector August 2016 HUG: Open Source Big Data Ingest with StreamSets Data Collector
August 2016 HUG: Open Source Big Data Ingest with StreamSets Data Collector
 
Suneel Marthi - Deep Learning with Apache Flink and DL4J
Suneel Marthi - Deep Learning with Apache Flink and DL4JSuneel Marthi - Deep Learning with Apache Flink and DL4J
Suneel Marthi - Deep Learning with Apache Flink and DL4J
 
Apache Hadoop 3.0 What's new in YARN and MapReduce
Apache Hadoop 3.0 What's new in YARN and MapReduceApache Hadoop 3.0 What's new in YARN and MapReduce
Apache Hadoop 3.0 What's new in YARN and MapReduce
 
August 2016 HUG: Better together: Fast Data with Apache Spark™ and Apache Ign...
August 2016 HUG: Better together: Fast Data with Apache Spark™ and Apache Ign...August 2016 HUG: Better together: Fast Data with Apache Spark™ and Apache Ign...
August 2016 HUG: Better together: Fast Data with Apache Spark™ and Apache Ign...
 
Dynamic and Static Modeling
Dynamic and Static ModelingDynamic and Static Modeling
Dynamic and Static Modeling
 

Similar a Wrangleconf Big Data Malaysia 2016

Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...EC-Council
 
THOTCON 0x6: Going Kinetic on Electronic Crime Networks
THOTCON 0x6: Going Kinetic on Electronic Crime NetworksTHOTCON 0x6: Going Kinetic on Electronic Crime Networks
THOTCON 0x6: Going Kinetic on Electronic Crime NetworksJohn Bambenek
 
Offensive Security basics part 1
Offensive Security basics  part 1Offensive Security basics  part 1
Offensive Security basics part 1wharpreet
 
Anomaly detection in deep learning
Anomaly detection in deep learningAnomaly detection in deep learning
Anomaly detection in deep learningAdam Gibson
 
The Cybercriminal Underground: Understanding and categorising criminal market...
The Cybercriminal Underground: Understanding and categorising criminal market...The Cybercriminal Underground: Understanding and categorising criminal market...
The Cybercriminal Underground: Understanding and categorising criminal market...Mark Arena
 
The Cybercriminal Underground: Understanding and categorising criminal market...
The Cybercriminal Underground: Understanding and categorising criminal market...The Cybercriminal Underground: Understanding and categorising criminal market...
The Cybercriminal Underground: Understanding and categorising criminal market...Mark Arena
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...APNIC
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4Rohit Kapoor
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4TEKMONKS
 
Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,
Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,
Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,Sigma Software
 
M1-02-HowCriminalsPlan.pdf
M1-02-HowCriminalsPlan.pdfM1-02-HowCriminalsPlan.pdf
M1-02-HowCriminalsPlan.pdfShylesh BC
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and DefenseAndrew McNicol
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertISSA LA
 
The State of Digital Identity Wallets – Darrell O’Donnell
The State of Digital Identity Wallets – Darrell O’DonnellThe State of Digital Identity Wallets – Darrell O’Donnell
The State of Digital Identity Wallets – Darrell O’DonnellSSIMeetup
 
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02PacSecJP
 
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for DefenseSANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for DefenseJohn Bambenek
 
LoginCat - Mini Presentation
LoginCat - Mini PresentationLoginCat - Mini Presentation
LoginCat - Mini PresentationRohit Kapoor
 
Login cat tekmonks - v5 (mini)
Login cat   tekmonks - v5 (mini)Login cat   tekmonks - v5 (mini)
Login cat tekmonks - v5 (mini)Rohit Kapoor
 

Similar a Wrangleconf Big Data Malaysia 2016 (20)

Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
 
THOTCON 0x6: Going Kinetic on Electronic Crime Networks
THOTCON 0x6: Going Kinetic on Electronic Crime NetworksTHOTCON 0x6: Going Kinetic on Electronic Crime Networks
THOTCON 0x6: Going Kinetic on Electronic Crime Networks
 
Offensive Security basics part 1
Offensive Security basics  part 1Offensive Security basics  part 1
Offensive Security basics part 1
 
Anomaly detection in deep learning
Anomaly detection in deep learningAnomaly detection in deep learning
Anomaly detection in deep learning
 
The Cybercriminal Underground: Understanding and categorising criminal market...
The Cybercriminal Underground: Understanding and categorising criminal market...The Cybercriminal Underground: Understanding and categorising criminal market...
The Cybercriminal Underground: Understanding and categorising criminal market...
 
The Cybercriminal Underground: Understanding and categorising criminal market...
The Cybercriminal Underground: Understanding and categorising criminal market...The Cybercriminal Underground: Understanding and categorising criminal market...
The Cybercriminal Underground: Understanding and categorising criminal market...
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4
 
Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,
Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,
Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,
 
M1-02-HowCriminalsPlan.pdf
M1-02-HowCriminalsPlan.pdfM1-02-HowCriminalsPlan.pdf
M1-02-HowCriminalsPlan.pdf
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvert
 
The State of Digital Identity Wallets – Darrell O’Donnell
The State of Digital Identity Wallets – Darrell O’DonnellThe State of Digital Identity Wallets – Darrell O’Donnell
The State of Digital Identity Wallets – Darrell O’Donnell
 
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
 
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for DefenseSANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
 
LoginCat - Mini Presentation
LoginCat - Mini PresentationLoginCat - Mini Presentation
LoginCat - Mini Presentation
 
Login cat tekmonks - v5 (mini)
Login cat   tekmonks - v5 (mini)Login cat   tekmonks - v5 (mini)
Login cat tekmonks - v5 (mini)
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 

Más de Adam Gibson

End to end MLworkflows
End to end MLworkflowsEnd to end MLworkflows
End to end MLworkflowsAdam Gibson
 
World Artificial Intelligence Conference Shanghai 2018
World Artificial Intelligence Conference Shanghai 2018World Artificial Intelligence Conference Shanghai 2018
World Artificial Intelligence Conference Shanghai 2018Adam Gibson
 
Deploying signature verification with deep learning
Deploying signature verification with deep learningDeploying signature verification with deep learning
Deploying signature verification with deep learningAdam Gibson
 
Self driving computers active learning workflows with human interpretable ve...
Self driving computers  active learning workflows with human interpretable ve...Self driving computers  active learning workflows with human interpretable ve...
Self driving computers active learning workflows with human interpretable ve...Adam Gibson
 
Anomaly Detection and Automatic Labeling with Deep Learning
Anomaly Detection and Automatic Labeling with Deep LearningAnomaly Detection and Automatic Labeling with Deep Learning
Anomaly Detection and Automatic Labeling with Deep LearningAdam Gibson
 
Strata Beijing 2017: Jumpy, a python interface for nd4j
Strata Beijing 2017: Jumpy, a python interface for nd4jStrata Beijing 2017: Jumpy, a python interface for nd4j
Strata Beijing 2017: Jumpy, a python interface for nd4jAdam Gibson
 
Boolan machine learning summit
Boolan machine learning summitBoolan machine learning summit
Boolan machine learning summitAdam Gibson
 
Advanced deeplearning4j features
Advanced deeplearning4j featuresAdvanced deeplearning4j features
Advanced deeplearning4j featuresAdam Gibson
 
Skymind - Udacity China presentation
Skymind - Udacity China presentationSkymind - Udacity China presentation
Skymind - Udacity China presentationAdam Gibson
 
Brief introduction to Distributed Deep Learning
Brief introduction to Distributed Deep LearningBrief introduction to Distributed Deep Learning
Brief introduction to Distributed Deep LearningAdam Gibson
 
Advanced spark deep learning
Advanced spark deep learningAdvanced spark deep learning
Advanced spark deep learningAdam Gibson
 
Skymind Open Power Summit ISV Round Table
Skymind Open Power Summit ISV Round TableSkymind Open Power Summit ISV Round Table
Skymind Open Power Summit ISV Round TableAdam Gibson
 
Nd4 j slides.pptx
Nd4 j slides.pptxNd4 j slides.pptx
Nd4 j slides.pptxAdam Gibson
 
Deep learning on Hadoop/Spark -NextML
Deep learning on Hadoop/Spark -NextMLDeep learning on Hadoop/Spark -NextML
Deep learning on Hadoop/Spark -NextMLAdam Gibson
 
Skymind & Deeplearning4j: Deep Learning for the Enterprise
Skymind & Deeplearning4j: Deep Learning for the EnterpriseSkymind & Deeplearning4j: Deep Learning for the Enterprise
Skymind & Deeplearning4j: Deep Learning for the EnterpriseAdam Gibson
 
Sf data mining_meetup
Sf data mining_meetupSf data mining_meetup
Sf data mining_meetupAdam Gibson
 

Más de Adam Gibson (16)

End to end MLworkflows
End to end MLworkflowsEnd to end MLworkflows
End to end MLworkflows
 
World Artificial Intelligence Conference Shanghai 2018
World Artificial Intelligence Conference Shanghai 2018World Artificial Intelligence Conference Shanghai 2018
World Artificial Intelligence Conference Shanghai 2018
 
Deploying signature verification with deep learning
Deploying signature verification with deep learningDeploying signature verification with deep learning
Deploying signature verification with deep learning
 
Self driving computers active learning workflows with human interpretable ve...
Self driving computers  active learning workflows with human interpretable ve...Self driving computers  active learning workflows with human interpretable ve...
Self driving computers active learning workflows with human interpretable ve...
 
Anomaly Detection and Automatic Labeling with Deep Learning
Anomaly Detection and Automatic Labeling with Deep LearningAnomaly Detection and Automatic Labeling with Deep Learning
Anomaly Detection and Automatic Labeling with Deep Learning
 
Strata Beijing 2017: Jumpy, a python interface for nd4j
Strata Beijing 2017: Jumpy, a python interface for nd4jStrata Beijing 2017: Jumpy, a python interface for nd4j
Strata Beijing 2017: Jumpy, a python interface for nd4j
 
Boolan machine learning summit
Boolan machine learning summitBoolan machine learning summit
Boolan machine learning summit
 
Advanced deeplearning4j features
Advanced deeplearning4j featuresAdvanced deeplearning4j features
Advanced deeplearning4j features
 
Skymind - Udacity China presentation
Skymind - Udacity China presentationSkymind - Udacity China presentation
Skymind - Udacity China presentation
 
Brief introduction to Distributed Deep Learning
Brief introduction to Distributed Deep LearningBrief introduction to Distributed Deep Learning
Brief introduction to Distributed Deep Learning
 
Advanced spark deep learning
Advanced spark deep learningAdvanced spark deep learning
Advanced spark deep learning
 
Skymind Open Power Summit ISV Round Table
Skymind Open Power Summit ISV Round TableSkymind Open Power Summit ISV Round Table
Skymind Open Power Summit ISV Round Table
 
Nd4 j slides.pptx
Nd4 j slides.pptxNd4 j slides.pptx
Nd4 j slides.pptx
 
Deep learning on Hadoop/Spark -NextML
Deep learning on Hadoop/Spark -NextMLDeep learning on Hadoop/Spark -NextML
Deep learning on Hadoop/Spark -NextML
 
Skymind & Deeplearning4j: Deep Learning for the Enterprise
Skymind & Deeplearning4j: Deep Learning for the EnterpriseSkymind & Deeplearning4j: Deep Learning for the Enterprise
Skymind & Deeplearning4j: Deep Learning for the Enterprise
 
Sf data mining_meetup
Sf data mining_meetupSf data mining_meetup
Sf data mining_meetup
 

Último

Cat & Art100 A collection of cat paintings
Cat & Art100 A collection of cat paintingsCat & Art100 A collection of cat paintings
Cat & Art100 A collection of cat paintingssandamichaela *
 
SLIDESHARE. ART OF THE ROMANTIC PERIOD/ROMANTICISM Art
SLIDESHARE. ART OF THE ROMANTIC PERIOD/ROMANTICISM ArtSLIDESHARE. ART OF THE ROMANTIC PERIOD/ROMANTICISM Art
SLIDESHARE. ART OF THE ROMANTIC PERIOD/ROMANTICISM ArtChum26
 
STAR Scholars Program Brand Guide Presentation
STAR Scholars Program Brand Guide PresentationSTAR Scholars Program Brand Guide Presentation
STAR Scholars Program Brand Guide Presentationmakaiodm
 
Roadrunner Motel, Motel/Residence. Tucumcari, NM
Roadrunner Motel, Motel/Residence. Tucumcari, NMRoadrunner Motel, Motel/Residence. Tucumcari, NM
Roadrunner Motel, Motel/Residence. Tucumcari, NMroute66connected
 
Vocal Music of the Romantic Period ~ MAPEH.pptx
Vocal Music of the Romantic Period ~ MAPEH.pptxVocal Music of the Romantic Period ~ MAPEH.pptx
Vocal Music of the Romantic Period ~ MAPEH.pptxMikaelaKaye
 
Edgar Allan Poe's City in the Sea - Storyboard
Edgar Allan Poe's City in the Sea - StoryboardEdgar Allan Poe's City in the Sea - Storyboard
Edgar Allan Poe's City in the Sea - Storyboardelijfdavis
 
The Masque of the Red Death Storyboard 2023
The Masque of the Red Death Storyboard 2023The Masque of the Red Death Storyboard 2023
The Masque of the Red Death Storyboard 2023magalybtapia
 
layered-cardboard-sculptures-miika-nyyssonen.pdf
layered-cardboard-sculptures-miika-nyyssonen.pdflayered-cardboard-sculptures-miika-nyyssonen.pdf
layered-cardboard-sculptures-miika-nyyssonen.pdfbaroquemodernist
 
New_Cross_Over (Comedy storyboard sample)
New_Cross_Over (Comedy storyboard sample)New_Cross_Over (Comedy storyboard sample)
New_Cross_Over (Comedy storyboard sample)DavonBrooks
 
Zoo_championship_Wrestling (action/comedy sample)
Zoo_championship_Wrestling (action/comedy sample)Zoo_championship_Wrestling (action/comedy sample)
Zoo_championship_Wrestling (action/comedy sample)DavonBrooks
 
Abu Dhabi Housewife Call Girls +971509530047 Abu Dhabi Call Girls
Abu Dhabi Housewife Call Girls +971509530047 Abu Dhabi Call GirlsAbu Dhabi Housewife Call Girls +971509530047 Abu Dhabi Call Girls
Abu Dhabi Housewife Call Girls +971509530047 Abu Dhabi Call Girlshayawit234
 
bumblefuck the best website you want to enjoy
bumblefuck the best website you want to enjoybumblefuck the best website you want to enjoy
bumblefuck the best website you want to enjoyInnaLaurie
 
Hiway Motel, Motel/Residence, Albuquerque NM
Hiway Motel, Motel/Residence, Albuquerque NMHiway Motel, Motel/Residence, Albuquerque NM
Hiway Motel, Motel/Residence, Albuquerque NMroute66connected
 
FORTH QUARTER MAPEH7-PHILIPPINE FESTIVALS.pptx
FORTH QUARTER MAPEH7-PHILIPPINE FESTIVALS.pptxFORTH QUARTER MAPEH7-PHILIPPINE FESTIVALS.pptx
FORTH QUARTER MAPEH7-PHILIPPINE FESTIVALS.pptxJadeTamme
 
Escort Service in Al Qusais +971509530047 UAE
Escort Service in Al Qusais +971509530047 UAEEscort Service in Al Qusais +971509530047 UAE
Escort Service in Al Qusais +971509530047 UAEvecevep119
 
Escort Service in Abu Dhabi +971509530047 UAE
Escort Service in Abu Dhabi +971509530047 UAEEscort Service in Abu Dhabi +971509530047 UAE
Escort Service in Abu Dhabi +971509530047 UAEvecevep119
 
Bai tap thuc hanh Anh 6 Mai Lan Huong.docx
Bai tap thuc hanh Anh 6 Mai Lan Huong.docxBai tap thuc hanh Anh 6 Mai Lan Huong.docx
Bai tap thuc hanh Anh 6 Mai Lan Huong.docxbichthuyt81
 
Value Aspiration And Culture Theory of Architecture
Value Aspiration And Culture Theory of ArchitectureValue Aspiration And Culture Theory of Architecture
Value Aspiration And Culture Theory of ArchitectureDarrenMasbate
 
San Jon Motel, Motel/Residence, San Jon, NM
San Jon Motel, Motel/Residence, San Jon, NMSan Jon Motel, Motel/Residence, San Jon, NM
San Jon Motel, Motel/Residence, San Jon, NMroute66connected
 

Último (20)

Cat & Art100 A collection of cat paintings
Cat & Art100 A collection of cat paintingsCat & Art100 A collection of cat paintings
Cat & Art100 A collection of cat paintings
 
SLIDESHARE. ART OF THE ROMANTIC PERIOD/ROMANTICISM Art
SLIDESHARE. ART OF THE ROMANTIC PERIOD/ROMANTICISM ArtSLIDESHARE. ART OF THE ROMANTIC PERIOD/ROMANTICISM Art
SLIDESHARE. ART OF THE ROMANTIC PERIOD/ROMANTICISM Art
 
STAR Scholars Program Brand Guide Presentation
STAR Scholars Program Brand Guide PresentationSTAR Scholars Program Brand Guide Presentation
STAR Scholars Program Brand Guide Presentation
 
Roadrunner Motel, Motel/Residence. Tucumcari, NM
Roadrunner Motel, Motel/Residence. Tucumcari, NMRoadrunner Motel, Motel/Residence. Tucumcari, NM
Roadrunner Motel, Motel/Residence. Tucumcari, NM
 
Vocal Music of the Romantic Period ~ MAPEH.pptx
Vocal Music of the Romantic Period ~ MAPEH.pptxVocal Music of the Romantic Period ~ MAPEH.pptx
Vocal Music of the Romantic Period ~ MAPEH.pptx
 
School :)
School                                 :)School                                 :)
School :)
 
Edgar Allan Poe's City in the Sea - Storyboard
Edgar Allan Poe's City in the Sea - StoryboardEdgar Allan Poe's City in the Sea - Storyboard
Edgar Allan Poe's City in the Sea - Storyboard
 
The Masque of the Red Death Storyboard 2023
The Masque of the Red Death Storyboard 2023The Masque of the Red Death Storyboard 2023
The Masque of the Red Death Storyboard 2023
 
layered-cardboard-sculptures-miika-nyyssonen.pdf
layered-cardboard-sculptures-miika-nyyssonen.pdflayered-cardboard-sculptures-miika-nyyssonen.pdf
layered-cardboard-sculptures-miika-nyyssonen.pdf
 
New_Cross_Over (Comedy storyboard sample)
New_Cross_Over (Comedy storyboard sample)New_Cross_Over (Comedy storyboard sample)
New_Cross_Over (Comedy storyboard sample)
 
Zoo_championship_Wrestling (action/comedy sample)
Zoo_championship_Wrestling (action/comedy sample)Zoo_championship_Wrestling (action/comedy sample)
Zoo_championship_Wrestling (action/comedy sample)
 
Abu Dhabi Housewife Call Girls +971509530047 Abu Dhabi Call Girls
Abu Dhabi Housewife Call Girls +971509530047 Abu Dhabi Call GirlsAbu Dhabi Housewife Call Girls +971509530047 Abu Dhabi Call Girls
Abu Dhabi Housewife Call Girls +971509530047 Abu Dhabi Call Girls
 
bumblefuck the best website you want to enjoy
bumblefuck the best website you want to enjoybumblefuck the best website you want to enjoy
bumblefuck the best website you want to enjoy
 
Hiway Motel, Motel/Residence, Albuquerque NM
Hiway Motel, Motel/Residence, Albuquerque NMHiway Motel, Motel/Residence, Albuquerque NM
Hiway Motel, Motel/Residence, Albuquerque NM
 
FORTH QUARTER MAPEH7-PHILIPPINE FESTIVALS.pptx
FORTH QUARTER MAPEH7-PHILIPPINE FESTIVALS.pptxFORTH QUARTER MAPEH7-PHILIPPINE FESTIVALS.pptx
FORTH QUARTER MAPEH7-PHILIPPINE FESTIVALS.pptx
 
Escort Service in Al Qusais +971509530047 UAE
Escort Service in Al Qusais +971509530047 UAEEscort Service in Al Qusais +971509530047 UAE
Escort Service in Al Qusais +971509530047 UAE
 
Escort Service in Abu Dhabi +971509530047 UAE
Escort Service in Abu Dhabi +971509530047 UAEEscort Service in Abu Dhabi +971509530047 UAE
Escort Service in Abu Dhabi +971509530047 UAE
 
Bai tap thuc hanh Anh 6 Mai Lan Huong.docx
Bai tap thuc hanh Anh 6 Mai Lan Huong.docxBai tap thuc hanh Anh 6 Mai Lan Huong.docx
Bai tap thuc hanh Anh 6 Mai Lan Huong.docx
 
Value Aspiration And Culture Theory of Architecture
Value Aspiration And Culture Theory of ArchitectureValue Aspiration And Culture Theory of Architecture
Value Aspiration And Culture Theory of Architecture
 
San Jon Motel, Motel/Residence, San Jon, NM
San Jon Motel, Motel/Residence, San Jon, NMSan Jon Motel, Motel/Residence, San Jon, NM
San Jon Motel, Motel/Residence, San Jon, NM
 

Wrangleconf Big Data Malaysia 2016

  • 1.
  • 2. Overview ● Brief Skymind Intro ● Deep Learning outside research ● Core trends for ROI in deep learning ● Anomaly Detection with deep learning ● Simbox fraud detection for telco ● Network Intrusion ● Fintech securities churn prediction ● Real time corporate campus security: Detecting dangerous objects
  • 3. Distributed Deep RL on Spark We built Deeplearning4j
  • 4. SKYMIND INTELLIGENCE LAYER (SKIL) REFERENCE ARCHITECTURE
  • 5. Deep Learning outside research ● Too much hype ● Most companies rarely do machine learning let alone deep learning ● Beginners try to jump to deep learning after andrew ng’s coursera class without first principles This is not deep learning. This is deep learning.
  • 6. Deep Learning outside research ● Mostly python and r on kaggle ● Many learning from udacity ● Most deep learning is research stage/enthusiast ● Salaried engineers doing DL mostly publishing papers ● Large fight for talent (see google fellowship)
  • 7. Deep Learning outside research ● Deep Learning hasn’t penetrated the fortune 2000 ● Fortune 2000 wants ROI not cat pictures ● Many organizations just NOW starting to take software seriously let alone data science ● Use cases for deep learning still not widely understood ● Large fight for talent (see google fellowship)
  • 8. Core trends for ROI in DL ● Mostly funded by adtech companies ● Companies doing DL have data from lots of media data (audio,image,video) ● Many companies using DL for ad targeting ● Best use cases are targeting understanding large scale hidden patterns in data (often cross domain) ● Time series has largely been ignored
  • 9. Core trends for ROI in DL ● Initial first attempts at deep learning following papers (no other examples) ● Many companies end up sticking to simpler techniques after trying DL ● Expectations for DL tend to match hype not reality ● Some rare cases exist outside this trend (mainly in asia)
  • 10. Core trends for ROI in DL For more trends see: https://www.oreilly.c om/ideas/the-curren t-state-of-machine-i ntelligence-3-0
  • 11. Anomaly Detection ● “Find the needle in the haystack” ● “Find the bad guy” ● “The machines about to break!” ● “Find the next market rally” ● “Take action on said anomaly”
  • 12. Anomaly Detection with deep learning ● Both unsupervised and supervised techniques ● LSTMs (time series neural net) ● Autoencoders (unsupervised) ● Expectations for DL tend to match hype not reality ● Some rare cases exist outside this trend (mainly in asia) LSTM AutoEncoder
  • 13. Simbox fraud for telco ● Costs telco over 3 billion yearly ● Route calls for free over a carrier network ● Need to mine raw call detail records to find ● Find and cluster fraudulent CDRs with autoencoders (unsupervised) ● Beats current rules and supervised based approaches
  • 14. Network Intrusion ● Raw web log traffic ● Detect attacks at points of origin ● Typically supervised learning ● Goal: Classify raw time series to find attacks ● Optional: Detect *kind* of attack
  • 15. Fintech securities churn prediction ● Predict when user is going to leave service ● Using recurrent nets find likelihood of leaving ● Using lift curves identify budget for sending discounts to percentage of users “worth” saving ● Optional: use autoencoders with kmeans to identify groups of users wanting to leave
  • 16. Corporate campus security ● At 30 FPS or more find dangerous objects in a crowd ● Identify a target object and send immediate report ● Uses variants of Convolutional nets ● Imagine hooking this up to a real camera
  • 17. Conclusion ● Deep Learning still young ● Many use cases not being tried ● Research is moving faster every year ● Talent still hard to find ● Will become more common with time