ayşe bilge gündüzinCode Like A GirlA Roadmap to Become a Machine Learning EngineerAs a Machine Learning Engineer, I remember feeling uncertain about the path ahead when I first started out. Back then, I had no idea that…4 min read·Apr 11, 2023--12--12
ayşe bilge gündüzEverything You Need to Know About IDOR (Insecure Direct Object References)I’ve started a new journey in this quarantine times and decided to investigate OWASP Top 10 and write about it as much in detail as…10 min read·Apr 19, 2020--5--5
ayşe bilge gündüzinTowards Data ScienceMachine Learning 101 — Artificial Neural NetworksThis post is intended to explain the Artificial Neural Networks in general and calculations especially.8 min read·Feb 20, 2020--1--1
ayşe bilge gündüzinTowards Data ScienceMachine Learning 101 - Naive Bayes(2)This the second part of my series of Machine Learning 101, I had tried to explain Decision Tree and Entropy Calculation at the very first…5 min read·Nov 20, 2019----
ayşe bilge gündüzAbstract Syntax Tree (AST) with PythonAST is an acronym for Abstract Syntax Tree (AST). The tree is a representation of a source code in a syntactical way and each node of the…2 min read·Nov 13, 2019----
ayşe bilge gündüzinTowards Data ScienceMachine Learning 101-ID3 Decision Trees and Entropy Calculation (1)This series includes the Machine Learning course notes which I collected while I was in the course phase at Ph.D.5 min read·Nov 11, 2019----
ayşe bilge gündüzinCode Like A GirlHow to Use Atom as a LaTeX editorSurfing the web makes me feel more and more insecure every passing day, since almost every application has been processing our data. As a…2 min read·Sep 19, 2019----
ayşe bilge gündüzinCode Like A GirlBeginning to Weka Step by StepThe concept of “Artificial Intelligence”, “Deep Learning” and “Machine Learning” are getting so popular among in every society, nowadays…9 min read·Nov 23, 2018--3--3
ayşe bilge gündüzinCode Like A GirlCross-Site Request Forgery*** Nothing contained in this article is intended to teach or encourage the use of security tools or methodologies for illegal or unethical…4 min read·Dec 5, 2017--1--1
ayşe bilge gündüzinCode Like A GirlEmpowering women by women with Informatica FeminaleThis story is my story explaining how I came to be a lecturer at Informatica Feminale(IF). What is Informatica Feminale? It’s an annual…3 min read·Oct 17, 2017----