Whether you're a seasoned developer or new to coding, a clear understanding of these basics will enhance your ability to effectively utilize containerization technology.
🤖 Are you interested in credit card fraud detection with an autoencoder?
Let's explore this together. 🧵👇🏽
1️⃣ Use Case: Credit Card Fraud Detection
Every day, countless credit card transactions occur.
Yet, only a tiny fraction of these are fraudulent. These rare, fraudulent transactions are anomalies that we need to detect.
2️⃣ Anomaly Types
Anomalies are data points that deviate from what is standard, normal, or expected.
There are different types of anomalies: Point anomalies, contextual anomalies, and collective anomalies. Each type has different characteristics and detection methods.
Don't worry, we have an easy-to-understand explanation for you!
Let's explore the world of autoencoders together. 🧵👇🏽
1️⃣ In General
Autoencoders are artificial neural networks. They are often used in anomaly detection.
In addition, they belong to the semi-supervised methods because you train them only with the normal state of the data.
2️⃣ How it works?
An autoencoder model tries to efficiently compress an input (encoding) and finally reconstruct this compression (decoding) so that the reconstruction matches the input data as closely as possible. The compressed layer is called the latent representation.
🤖 Do you know how neural networks work in general?
Don't worry, we explain it clearly.
Let's go over it together. 🧵👇🏽
1️⃣ Basic idea
An artificial neural network (ANN) consists of artificial neurons (also called nodes) and connections (also called edges) between these neurons. In addition, an ANN has one or more hidden layers, each layer consisting of several neurons.
Each neuron in each layer receives the output of each neuron in the previous layer as input. Each input to the neuron is weighted. The connections between the nodes are acyclic.
2️⃣ Feedforward
💡 Feedforward is the flow of the input data through the ANN from the input layer to the output layer.
As the input data passes through the individual layers of the network, it is weighted at the edges and normalized by an activation function.