
Breaking down 3D Linear Regression
Understand the concept of 3D linear regression or regression using 2 independent variables to predict a target variable using simple OLS in 5 minutes.
Understand the concept of 3D linear regression or regression using 2 independent variables to predict a target variable using simple OLS in 5 minutes.
Is Ridge Regression an optimization of Linear Regression, join me in this post to know the perks of Ridge regression and how it can solve the problem of bias and model under-fitting.
In the rapidly evolving landscape of artificial intelligence, Large Language Models (LLMs) and Generative AI Security have become integral to various applications, from customer service chatbots to content generation tools
The OWASP Machine Learning Security Top 10 is a comprehensive guide developed by the OWASP foundation to address severe vulnerabilities in machine learning models and systems. Organizations can protect their ML Security Risks against attacks that occur in the various stages of the ML lifecycle to ensure robust and reliable ML applications.
Prompt injection is a technique where an adversary manipulates or exploits inputs given to a Language Model (LLM) to achieve unintended outputs or disrupt the desired behavior.
Understand the concept of 3D linear regression or regression using 2 independent variables to predict a target variable using simple OLS in 5 minutes.
Is Ridge Regression an optimization of Linear Regression, join me in this post to know the perks of Ridge regression and how it can solve the problem of bias and model under-fitting.
Build Deep learning models leveraging gradient descent efficiently with pytorch, replacing the stressful gradient computation at each checkpoint in back propagation.
In the rapidly evolving landscape of artificial intelligence, Large Language Models (LLMs) and Generative AI Security have become integral to various applications, from customer service
The OWASP Machine Learning Security Top 10 is a comprehensive guide developed by the OWASP foundation to address severe vulnerabilities in machine learning models and
Prompt injection is a technique where an adversary manipulates or exploits inputs given to a Language Model (LLM) to achieve unintended outputs or disrupt the
Dive into the science and psychology behind the absurdity of coincidence, sync and collective unconscious.
This post covers the science behind the exceptional effects of music in our brain.
Uncover science backed simple yet effective techniques to transform restless night’s sleep into a rejuvenating ritual.
A detailed summary of the core ideologies exploring the shocking psychology behind money
Core insights from 21 Lessons for the 21st Century.
A brief summary of Atomic Habits
I am a curious learner and a student of Artificial Intelligence. I have a strong passion for gaining knowledge and exploring new concepts. One thing that excites me the most is getting the most out of the information I read. Most of the information that we absorb does not provide value unless we have the intuition and interest in the subject matter. I am confident that possessing the correct intuition and genuine interest in a subject is crucial to fully capitalize on the knowledge it provides. Here at sapiencespace, we are committed to delivering content that not only adds value to life, but also exceeds expectations. Our blog is specifically tailored to provide comprehensive book summaries, in-depth discussions on AI, programming and cybersecurity.
I am an accomplished Information Security professional with over 15 years of extensive experience in various domains of security. As an Offensive Security Certified Professional (OSCP) and Certified Ethical Hacker (CEH), I bring deep technical expertise and a proactive approach to safeguarding information assets. I'm a post graduate in artificial intelligence and machine learning from University of Texas. I have extensive experience integrating security practices into the Software Development Life Cycle (SDLC), ensuring robust protection from the start. My skills include threat modeling, secure code review, penetration testing, security architecture review, application security, mobile security, cloud security, and vulnerability management. I remain committed to continuous learning and staying updated on security trends to effectively tackle challenges and protect valuable information assets, fostering a culture of continuous security enhancement. Currently, I serve as a Principal Security Engineer at Microsoft, where I lead initiatives to fortify our security posture and drive innovation in our security solutions. My passion lies in not only identifying and mitigating security threats but also in educating and empowering teams to embrace security best practices, ultimately creating a safer digital environment for all. In this platform, I disseminate the most recent trends and concepts pertaining to cybersecurity and AI security.