Update README.md
Browse files
README.md
CHANGED
@@ -38,7 +38,7 @@ https://www.linkedin.com/in/r-jagan-raj/
|
|
38 |
|
39 |
TrainOutput(global_step=6297, training_loss=0.07093968526965307, metrics={'train_runtime': 5545.442, 'train_samples_per_second': 9.08, 'train_steps_per_second': 1.136, 'total_flos': 1.32489571926528e+16, 'train_loss': 0.07093968526965307, 'epoch': 3.0})
|
40 |
|
41 |
-
|
42 |
|
43 |
**Step 1:** Installing Dependencies: Use the command below to install all the required libraries:
|
44 |
|
@@ -97,7 +97,7 @@ print(f"Prediction: {result}")
|
|
97 |
|
98 |
```
|
99 |
|
100 |
-
|
101 |
This fine-tuned BERT model is designed to detect phishing emails. Built on the powerful BERT (Bidirectional Encoder Representations from Transformers) architecture, it performs binary classification to label emails as either phishing or legitimate.
|
102 |
|
103 |
The model has been fine-tuned using a dataset of phishing and legitimate emails, ensuring it understands patterns and linguistic cues commonly found in phishing content. By leveraging contextual understanding, it can identify subtle differences in text that distinguish malicious intent from normal communication. This makes it an effective tool for email security and anti-phishing defenses.
|
|
|
38 |
|
39 |
TrainOutput(global_step=6297, training_loss=0.07093968526965307, metrics={'train_runtime': 5545.442, 'train_samples_per_second': 9.08, 'train_steps_per_second': 1.136, 'total_flos': 1.32489571926528e+16, 'train_loss': 0.07093968526965307, 'epoch': 3.0})
|
40 |
|
41 |
+
## How to Use
|
42 |
|
43 |
**Step 1:** Installing Dependencies: Use the command below to install all the required libraries:
|
44 |
|
|
|
97 |
|
98 |
```
|
99 |
|
100 |
+
# Model Summary:
|
101 |
This fine-tuned BERT model is designed to detect phishing emails. Built on the powerful BERT (Bidirectional Encoder Representations from Transformers) architecture, it performs binary classification to label emails as either phishing or legitimate.
|
102 |
|
103 |
The model has been fine-tuned using a dataset of phishing and legitimate emails, ensuring it understands patterns and linguistic cues commonly found in phishing content. By leveraging contextual understanding, it can identify subtle differences in text that distinguish malicious intent from normal communication. This makes it an effective tool for email security and anti-phishing defenses.
|