SlideShare a Scribd company logo
PowerSpy: Location Tracking using
Mobile Device Power Analysis
Master’s course 29th Park Joon-young
Contents
• Working idea
• Paper introduction
• Techniques & Evaluation
• Conclusion of paper
• What I have to do
Paper introduction
• PowerSpy, Dan Boneh
• USENIX Security, 2015 / Acceptance ratio : 15.7%(67/426)
• Learn user’s location from reading phone’s power consumption
Contributions
• Showed power meter available on medern phones can reveal
potentially private information
• Developed the machine learning techniques for infer location
information from power meter data.
• Discussed potential continuation, countermeasures for this work.
Assumptions
• Malicious application is installed and running in background
• Only has permission to access power data, network communication

- Cannot measure the power consumed by the cellular radio alone.
• Prior knowledge of the area/routes through which the victim moves.
• Cannot locate a phone that is standing still.
Motivation
Motivation
Motivation
Motivation
Motivation
Motivation
Motivation
Motivation
Signal strength affects power consumption
Motivation
Motivation
Same model Defferent model
• And we can get battery info without any permissions
Motivation
Challenges
• Pre-measurement may have different speed or stops.
• Have to identify the target’s power profile in many pre-collected
profiles along different routes
• Exact location of the target may be ambiguous
• Target may travel the road which the attacker partially measured.
Route distinguishing
• Each power profile is time series
• used Dynamic Time Warping
Euclidean DTW
Route distinguishing
- Dynamic Time Warping
Route distinguishing
• Normalization
• MA Smoothing (obtain general trends)
• Downsampling (computation reduction)
Real-time tracking
• Track target in real-time
• Subsequence DTW
• Motion model applied
• Optimal Subsequence Bijection
OSB DTW
- Optimal Subsequence Bijection
Real-time tracking
Real-time tracking
- Optimal Subsequence Bijection
Inference of new routes
Particle
Filter
Particle Filter
Particle Filter
Particle Filter
Particle Filter
Particle Filter
Particle Filter
Particle Filter
Particle Filter
Particle Filter
Evaluation
• Nexus 4, Nexus 5, HTC
• Enough communication is occuring
• Driver might be using nav sw or streaming music
• Unexpected events (e.g., phone call) can be normalized using MA
Evaluation
- Route distinguishing
- Real-time tracking
Evaluation
Before & After using improved motion model
Conclusion
Without location based permission,
Route identification
Real-time tracking
Identify new route
Question?

More Related Content

Similar to Power spy

Sensor's inside
Sensor's insideSensor's inside
Sensor's inside
Anando Kumar Paul
 
E3 chap-09
E3 chap-09E3 chap-09
Collecting big data in cinemas to improve recommendation systems - a model wi...
Collecting big data in cinemas to improve recommendation systems - a model wi...Collecting big data in cinemas to improve recommendation systems - a model wi...
Collecting big data in cinemas to improve recommendation systems - a model wi...
ICDEcCnferenece
 
Study of Tactile interactions for visually disabled and hearing impaired
Study of Tactile interactions for visually disabled and hearing impaired Study of Tactile interactions for visually disabled and hearing impaired
Study of Tactile interactions for visually disabled and hearing impaired
Taslima Projucti
 
Sue York ESRA Presentation Lisbon July 2017
Sue York ESRA Presentation Lisbon July 2017Sue York ESRA Presentation Lisbon July 2017
Sue York ESRA Presentation Lisbon July 2017
Sue York
 
Remote usability testing and remote user research for usability
Remote usability testing and remote user research for usabilityRemote usability testing and remote user research for usability
Remote usability testing and remote user research for usability
User Vision
 
l1_introduction.pdf
l1_introduction.pdfl1_introduction.pdf
l1_introduction.pdf
Dumith Jayathilaka
 
Sampling techniques market research
Sampling techniques market researchSampling techniques market research
Sampling techniques market research
Krishna Ramakrishnan
 
Study of Tactile interactions for visually disabled and hearing impaired
Study of  Tactile interactions for visually disabled and hearing impaired Study of  Tactile interactions for visually disabled and hearing impaired
Study of Tactile interactions for visually disabled and hearing impaired
Abu Saleh Musa
 
Indoor Mapping & Tracking
Indoor Mapping & TrackingIndoor Mapping & Tracking
Indoor Mapping & Tracking
Vimala Siravi
 
Chapters 14 and 15 presentation
Chapters 14 and 15 presentationChapters 14 and 15 presentation
Chapters 14 and 15 presentation
William Perkins
 
Reduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsReduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic Previews
Cellebrite
 
Predicting bus arrival time based on participatory mobile phone sensing
Predicting bus arrival time based on participatory mobile phone sensingPredicting bus arrival time based on participatory mobile phone sensing
Predicting bus arrival time based on participatory mobile phone sensing
Sreeraj Puzhakkattiri
 
Comp4010 lecture11 VR Applications
Comp4010 lecture11 VR ApplicationsComp4010 lecture11 VR Applications
Comp4010 lecture11 VR Applications
Mark Billinghurst
 
Anits dip
Anits dipAnits dip
Comp4010 lecture11 VR Applications
Comp4010 lecture11 VR ApplicationsComp4010 lecture11 VR Applications
Comp4010 lecture11 VR Applications
Mark Billinghurst
 
Single Object Filtering, Single Target Tracking
Single Object Filtering, Single Target TrackingSingle Object Filtering, Single Target Tracking
Single Object Filtering, Single Target Tracking
Engin Gul
 
iBAT: Detecting Anomalous Taxi Trajectories from GPS Traces
iBAT: Detecting Anomalous Taxi Trajectories from GPS TracesiBAT: Detecting Anomalous Taxi Trajectories from GPS Traces
iBAT: Detecting Anomalous Taxi Trajectories from GPS Traces
Rrubaa Panchendrarajan
 
Carrasco
CarrascoCarrasco
Carrasco
Say Bunthet
 
DemetTalk
DemetTalkDemetTalk
DemetTalk
Demet Aksoy
 

Similar to Power spy (20)

Sensor's inside
Sensor's insideSensor's inside
Sensor's inside
 
E3 chap-09
E3 chap-09E3 chap-09
E3 chap-09
 
Collecting big data in cinemas to improve recommendation systems - a model wi...
Collecting big data in cinemas to improve recommendation systems - a model wi...Collecting big data in cinemas to improve recommendation systems - a model wi...
Collecting big data in cinemas to improve recommendation systems - a model wi...
 
Study of Tactile interactions for visually disabled and hearing impaired
Study of Tactile interactions for visually disabled and hearing impaired Study of Tactile interactions for visually disabled and hearing impaired
Study of Tactile interactions for visually disabled and hearing impaired
 
Sue York ESRA Presentation Lisbon July 2017
Sue York ESRA Presentation Lisbon July 2017Sue York ESRA Presentation Lisbon July 2017
Sue York ESRA Presentation Lisbon July 2017
 
Remote usability testing and remote user research for usability
Remote usability testing and remote user research for usabilityRemote usability testing and remote user research for usability
Remote usability testing and remote user research for usability
 
l1_introduction.pdf
l1_introduction.pdfl1_introduction.pdf
l1_introduction.pdf
 
Sampling techniques market research
Sampling techniques market researchSampling techniques market research
Sampling techniques market research
 
Study of Tactile interactions for visually disabled and hearing impaired
Study of  Tactile interactions for visually disabled and hearing impaired Study of  Tactile interactions for visually disabled and hearing impaired
Study of Tactile interactions for visually disabled and hearing impaired
 
Indoor Mapping & Tracking
Indoor Mapping & TrackingIndoor Mapping & Tracking
Indoor Mapping & Tracking
 
Chapters 14 and 15 presentation
Chapters 14 and 15 presentationChapters 14 and 15 presentation
Chapters 14 and 15 presentation
 
Reduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsReduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic Previews
 
Predicting bus arrival time based on participatory mobile phone sensing
Predicting bus arrival time based on participatory mobile phone sensingPredicting bus arrival time based on participatory mobile phone sensing
Predicting bus arrival time based on participatory mobile phone sensing
 
Comp4010 lecture11 VR Applications
Comp4010 lecture11 VR ApplicationsComp4010 lecture11 VR Applications
Comp4010 lecture11 VR Applications
 
Anits dip
Anits dipAnits dip
Anits dip
 
Comp4010 lecture11 VR Applications
Comp4010 lecture11 VR ApplicationsComp4010 lecture11 VR Applications
Comp4010 lecture11 VR Applications
 
Single Object Filtering, Single Target Tracking
Single Object Filtering, Single Target TrackingSingle Object Filtering, Single Target Tracking
Single Object Filtering, Single Target Tracking
 
iBAT: Detecting Anomalous Taxi Trajectories from GPS Traces
iBAT: Detecting Anomalous Taxi Trajectories from GPS TracesiBAT: Detecting Anomalous Taxi Trajectories from GPS Traces
iBAT: Detecting Anomalous Taxi Trajectories from GPS Traces
 
Carrasco
CarrascoCarrasco
Carrasco
 
DemetTalk
DemetTalkDemetTalk
DemetTalk
 

More from Joon Young Park

WheelLogger_WISA
WheelLogger_WISAWheelLogger_WISA
WheelLogger_WISA
Joon Young Park
 
MoLe: Motion Leaks through Smartwatch Sensors
MoLe: Motion Leaks through Smartwatch SensorsMoLe: Motion Leaks through Smartwatch Sensors
MoLe: Motion Leaks through Smartwatch Sensors
Joon Young Park
 
MACTANS: Injecting Malware
into iOS Devices via Malicious Chargers
MACTANS: Injecting Malware
into iOS Devices via Malicious ChargersMACTANS: Injecting Malware
into iOS Devices via Malicious Chargers
MACTANS: Injecting Malware
into iOS Devices via Malicious Chargers
Joon Young Park
 
Leave me alone; app level protection against runtime information gathering on...
Leave me alone; app level protection against runtime information gathering on...Leave me alone; app level protection against runtime information gathering on...
Leave me alone; app level protection against runtime information gathering on...
Joon Young Park
 
Android Security Internals (Lesson 3)
Android Security Internals (Lesson 3)Android Security Internals (Lesson 3)
Android Security Internals (Lesson 3)
Joon Young Park
 
Delegation-based Authentication and Authorization for the IP-based IoT
Delegation-based Authentication and Authorization for the IP-based IoTDelegation-based Authentication and Authorization for the IP-based IoT
Delegation-based Authentication and Authorization for the IP-based IoT
Joon Young Park
 
Lithe: Lightweight Secure CoAP for the Internet of Things
Lithe: Lightweight Secure CoAP for the Internet of ThingsLithe: Lightweight Secure CoAP for the Internet of Things
Lithe: Lightweight Secure CoAP for the Internet of Things
Joon Young Park
 
Internet of secure things
Internet of secure thingsInternet of secure things
Internet of secure things
Joon Young Park
 
Electronic Signature
Electronic SignatureElectronic Signature
Electronic Signature
Joon Young Park
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
Joon Young Park
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
Joon Young Park
 
MiTumb
MiTumbMiTumb
Linux Remote Connection
Linux Remote ConnectionLinux Remote Connection
Linux Remote Connection
Joon Young Park
 
License Plate Recognition
License Plate RecognitionLicense Plate Recognition
License Plate Recognition
Joon Young Park
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
Joon Young Park
 
DDD
DDDDDD
Baas.io
Baas.ioBaas.io
LBSNS Flatform Business
LBSNS Flatform BusinessLBSNS Flatform Business
LBSNS Flatform Business
Joon Young Park
 

More from Joon Young Park (18)

WheelLogger_WISA
WheelLogger_WISAWheelLogger_WISA
WheelLogger_WISA
 
MoLe: Motion Leaks through Smartwatch Sensors
MoLe: Motion Leaks through Smartwatch SensorsMoLe: Motion Leaks through Smartwatch Sensors
MoLe: Motion Leaks through Smartwatch Sensors
 
MACTANS: Injecting Malware
into iOS Devices via Malicious Chargers
MACTANS: Injecting Malware
into iOS Devices via Malicious ChargersMACTANS: Injecting Malware
into iOS Devices via Malicious Chargers
MACTANS: Injecting Malware
into iOS Devices via Malicious Chargers
 
Leave me alone; app level protection against runtime information gathering on...
Leave me alone; app level protection against runtime information gathering on...Leave me alone; app level protection against runtime information gathering on...
Leave me alone; app level protection against runtime information gathering on...
 
Android Security Internals (Lesson 3)
Android Security Internals (Lesson 3)Android Security Internals (Lesson 3)
Android Security Internals (Lesson 3)
 
Delegation-based Authentication and Authorization for the IP-based IoT
Delegation-based Authentication and Authorization for the IP-based IoTDelegation-based Authentication and Authorization for the IP-based IoT
Delegation-based Authentication and Authorization for the IP-based IoT
 
Lithe: Lightweight Secure CoAP for the Internet of Things
Lithe: Lightweight Secure CoAP for the Internet of ThingsLithe: Lightweight Secure CoAP for the Internet of Things
Lithe: Lightweight Secure CoAP for the Internet of Things
 
Internet of secure things
Internet of secure thingsInternet of secure things
Internet of secure things
 
Electronic Signature
Electronic SignatureElectronic Signature
Electronic Signature
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
 
MiTumb
MiTumbMiTumb
MiTumb
 
Linux Remote Connection
Linux Remote ConnectionLinux Remote Connection
Linux Remote Connection
 
License Plate Recognition
License Plate RecognitionLicense Plate Recognition
License Plate Recognition
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
DDD
DDDDDD
DDD
 
Baas.io
Baas.ioBaas.io
Baas.io
 
LBSNS Flatform Business
LBSNS Flatform BusinessLBSNS Flatform Business
LBSNS Flatform Business
 

Recently uploaded

DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 

Recently uploaded (20)

DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 

Power spy