3 Short Links on Applying Weak Supervision to Cybersecurity Problems

Jason Trost
2 min readAug 7, 2022

--

Image credit: DALL-E: “a team of robots identifying viruses on an assembly line, digital art”

In this post, I share a few links of examples of using Weak Supervision for cyber security use cases. I was surprised that I couldn’t find more examples.

According to wikipedia

Weak supervision is a branch of machine learning where noisy, limited, or imprecise sources are used to provide supervision signal for labeling large amounts of training data in a supervised learning setting. This approach alleviates the burden of obtaining hand-labeled data sets, which can be costly or impractical. Instead, inexpensive weak labels are employed with the understanding that they are imperfect, but can nonetheless be used to create a strong predictive model.

Weak supervision was popularized by the release of this paper:Snorkel: Rapid Training Data Creation with Weak Supervision and the library/toolset with the same name: https://github.com/snorkel-team/snorkel

Links:

–Jason
@jason_trost

The “short links” format was inspired by O’Reilly’s Four Short Links series.

--

--

Jason Trost
Jason Trost

Written by Jason Trost

Interests: Network security, Digital Forensics, Machine Learning, Big Data. retweets are not endorsements.