article thumbnail

Proposals for model vulnerability and security

O'Reilly on Data

The objective here is to brainstorm on potential security vulnerabilities and defenses in the context of popular, traditional predictive modeling systems, such as linear and tree-based models trained on static data sets. If an attacker can receive many predictions from your model API or other endpoint (website, app, etc.),

Modeling 219
article thumbnail

Structural Evolutions in Data

O'Reilly on Data

While data scientists were no longer handling Hadoop-sized workloads, they were trying to build predictive models on a different kind of “large” dataset: so-called “unstructured data.” ” There’s as much Keras, TensorFlow, and Torch today as there was Hadoop back in 2010-2012. And it was good.

article thumbnail

Using random effects models in prediction problems

The Unofficial Google Data Science Blog

These predictive posterior distributions have many uses such as in multi-armed bandit problems. Thompson sampling is an "explore/exploit" algorithm which was designed for Bayesian models, and its strategy is to randomly select a choice (called an "arm") with probability proportional to the posterior of that choice being the best option.