Day 11 Dimensionality Reduction


Day 11 Poster

Today I explored Dimensionality Reduction β€” a vital step to make sense of high-dimensional data πŸ“‰πŸ”


πŸ” Analogy

Imagine packing for a trip. You have a massive wardrobe (your data), but your suitcase only fits 10 items. So, you pick versatile clothes β€” a few that cover most needs (formal, casual, warm, cold).

That’s Dimensionality Reduction: Compressing a huge dataset into its most meaningful parts β€” minimizing loss while maximizing utility.


πŸ”Ή Two Common Techniques

βœ… PCA (Principal Component Analysis)

🧳 Like folding and layering smartly to save space, PCA finds directions (components) that capture the most variance (info).

  • Linear method

  • Great when data lies in neat, straight patterns

βœ… t-SNE (t-distributed Stochastic Neighbor Embedding)

🧳 Like grouping clothes by outfits (shoes + formalwear), t-SNE clusters related data together.

  • Non-linear

  • Captures local relationships, distorts global structure

  • Ideal for visualizing complex, high-dimensional datasets


πŸš€ These techniques help models:

  • βœ… Train faster

  • βœ… Generalize better

  • βœ… Reveal hidden patterns


πŸ” Security Lens

⚠️ Information Loss & Blind Spots

πŸŽ’ You packed for summer, but forgot a raincoat. Rare threats (low variance) may get discarded β€” making your model blind to anomalies or attacks.

"Low variance" β‰  "low importance" β€” especially in security contexts.

⚠️ Feature Obfuscation by Attackers

πŸŽ’ Attackers can embed malicious patterns in dimensions likely to be discarded or compressed β€” bypassing detection pipelines.

⚠️ Inference Attacks on Embeddings

πŸŽ’ It's like sharing a blurred photo of your bag β€” someone could still guess your travel habits from the outline of items.

t-SNE visualizations can leak structural info β€” attackers might infer relationships between users, labels, or features. These compressed representations, if exposed, can be mined or reversed to extract sensitive patterns or identities.


πŸ“š Key References


πŸ’¬ Prompt

Have you visualized your model with t-SNE? What insights β€” or vulnerabilities β€” did you discover?


πŸ“… Tomorrow

We explore KNN & Clustering β€” the simplest ML algorithms and how attackers exploit proximity logic πŸ”—πŸ‘₯


πŸ”— Missed Day 10?

Catch up here: https://lnkd.in/gMh3rr8b


#100DaysOfAISec - Day 11 Post #AISecurity #MLSecurity #MachineLearningSecurity #DimensionalityReduction #CyberSecurity #AIPrivacy #AdversarialML #LearningInPublic #100DaysChallenge #ArifLearnsAI #LinkedInTech

Last updated