From fraudulence to adversarial learning จรัล งามวิโรจน์เจริญ chief data scientist and VP of Data Innovation Lab at Sertis, former lead data scientist of Booz Allen Hamilton
From fraudulence to adversarial learning จรัล งามวิโรจน์เจริญ chief data scientist and VP of Data Innovation Lab at Sertis, former lead data scientist of Booz Allen Hamilton
Text Mining in Business Intelligence โดย รศ.ดร.โอม ศรนิล
Similar to From fraudulence to adversarial learning จรัล งามวิโรจน์เจริญ chief data scientist and VP of Data Innovation Lab at Sertis, former lead data scientist of Booz Allen Hamilton
PurchasingB2B - Mistaken Identity - October 2016Paige Schaffer
Similar to From fraudulence to adversarial learning จรัล งามวิโรจน์เจริญ chief data scientist and VP of Data Innovation Lab at Sertis, former lead data scientist of Booz Allen Hamilton (20)
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
From fraudulence to adversarial learning จรัล งามวิโรจน์เจริญ chief data scientist and VP of Data Innovation Lab at Sertis, former lead data scientist of Booz Allen Hamilton
1. From fraudulence to adversarial learning
The First NIDA Business Analytics and Data Sciences Contest/Conference
วันที่ 1-2 กันยายน 2559 ณ อาคารนวมินทราธิราช สถาบันบัณฑิตพัฒนบริหารศาสตร์
https://businessanalyticsnida.wordpress.com
https://www.facebook.com/BusinessAnalyticsNIDA/
-- Fraudulent detection (ID Theft) approach & process
- Evolution of fraudulence to sophisticated actor - adversarial learning
จรัล งามวิโรจน์เจริญ
Current chief data scientist and VP of Data Innovation Lab at Sertis,
Former lead data scientist of Booz Allen Hamilton
นวมินทราธิราช 3002 วันที่ 1 กันยายน 2559 15.15-15.45 น.
2. F r o m F r a u d u l e n c e t o a d v e r s a r i a l l e a r n i n g
Theft
3. Address
National IDPhone Number
Child NameSpouse Name
Bank Account
Credit Card Number
User Profile
Electronic Record
Who?
ID Theft Definition
Business Objectives
11. Dark Web Marketplace – Credentials for Sale/ Hacking Services
Reference: Trend Micro Follow the Data: Dissecting Data Breaches and Debunking Myths
SecureWorks: Underground Hacker Markets
12. New Trend – Adversarial Learning
Reference: https://sarahjamielewis.com/posts/adversarial-machine-learning.html
Model
Generate
new
sample
Desired
Outcome?
Evasion
Success
Yes
No
Model
Regular
Training
sample
Desired
Outcome?
Poisoned
Yes
Generate
Mallicious
sample