Offensive vs Defensive Security — Part VI: Building a Cohesive StrategyWelcome to our final entry of a blog series where we explore fundamental security principles in both Offensive and Defensive Security…Mar 8Mar 8
Offensive vs Defensive Security — Part V: Security Through ObscurityWelcome to our fifth entry of a blog series where we explore fundamental security principles in both Offensive and Defensive Security…Mar 8Mar 8
Offensive vs Defensive Security — Part 4: Secure by designWelcome to our fourth entry of a blog series where we explore fundamental security principles in both Offensive and Defensive Security…Mar 8Mar 8
Time Series Forecasting done with LSTMWhat is a time series and what is special about it?Dec 28, 2020Dec 28, 2020
Transfer Learning: A VGG16 based custom CNN for CIFAR 10 image classificationAbstractSep 29, 2020Sep 29, 2020
Regularization techniques: In shortWhen training neural networks, it is not so much the performance on the training set that matters, but rather that the network is able to…Sep 2, 2020Sep 2, 2020
Regularization techniques: In shortWhen training neural networks, it is not so much the performance on the training set that matters, but rather that the network is able to…Sep 2, 2020Sep 2, 2020
Regularization techniquesWhen training neural networks, it is not so much the performance on the training set that matters, but rather that the network is able to…Sep 2, 2020Sep 2, 2020