Hi! This is my first attempt to write a Jupyter notebook to wordpress. Jupyter notebooks are an increasingly popular way to combine code, results and content to one viewable platform. Notebooks use ‘kernels’ as interpreters to scripted languages. So far, I’ve seen Python, Julia and R kernels here. (The full notebook is over at GitHub. […]
I thank Data Science PH meetup group for the opportunity to hold a talk and introduce Cybersecurity + Data Science.
Here’s a post from one of my Kaggle competitions, the State Farm Distracted Driver Detection challenge. It’s a very interesting challenge, one that pits computer vision and foolish drivers who even had the guts to text on the phone while driving. Well, technically, these drivers aren’t really doing anything risky. These are artificial images made […]
It’s over 70!
This is quite a late post for me, but I just want to detail here the session I taught three weeks ago. We have a large machine learning competition in Trend Micro and I volunteered to hold a boot camp for Trend Labs, the “Philippine division”, prior to the competition. Thinking that it was high […]
Deep Dive Weeks 2 & 3
The past two weeks involved supervised learning. After discovering NumPy and doing some feature engineering with the homework, we proceeded with supervised learning.
Deep Dive Wednesdays Week 0
This week we’re starting Deep Dive Wednesdays in our team in Trend Labs. It’s a series of workshops that I will facilitate where we tackle data science topics and machine learning. It will be hands-on, with the scipy stack and scikit-learn as our tools.
Food Recognition Challenge
There is a recent public excitement over an algorithm that recognizes a person’s gender and age, so me and my colleague, Jay Garcia, decided to take this well-researched topic to everyone’s favorite activity, eating. In this post, I’m going to show you how we made an algorithm that can recognize some dishes AI-style.
This is a paper for our CS 253 class, Computer Security. It’s a lengthy, quite formal paper, which talks about computer security with relation to malware. Before the TLDR, I’ll just share some striking quotes I find in my references. Truly, computer security has become an arms race where data is both the target and […]