Book Image

R Deep Learning Projects

Book Image

R Deep Learning Projects

Overview of this book

R is a popular programming language used by statisticians and mathematicians for statistical analysis, and is popularly used for deep learning. Deep Learning, as we all know, is one of the trending topics today, and is finding practical applications in a lot of domains. This book demonstrates end-to-end implementations of five real-world projects on popular topics in deep learning such as handwritten digit recognition, traffic light detection, fraud detection, text generation, and sentiment analysis. You'll learn how to train effective neural networks in R—including convolutional neural networks, recurrent neural networks, and LSTMs—and apply them in practical scenarios. The book also highlights how neural networks can be trained using GPU capabilities. You will use popular R libraries and packages—such as MXNetR, H2O, deepnet, and more—to implement the projects. By the end of this book, you will have a better understanding of deep learning concepts and techniques and how to use them in a practical setting.
Table of Contents (11 chapters)

Credit card fraud detection with autoencoders


Fraud is a multi-billion dollar industry, with credit card fraud being probably the closest to our daily lives. Fraud begins with the theft of the physical credit card or with data that could compromise the security of the account, such as the credit card number, expiration date and security codes. A stolen card can be reported directly, if the victim knows that their card has been stolen, however, when the data is stolen, a compromised account can take weeks or even months to be used, and the victim then only knows from their bank statement that the card has been used. 

Traditionally, fraud detection systems rely on the creation of manually engineered features by subject matter experts, working either directly with financial institutions or with specialized software vendors. 

One of the biggest challenges in fraud detection is the availability of labelled datasets, which are often hard or even impossible to come by.

Our first fraud example comes...