22 research outputs found

    An order flow model and a liquidity measure of financial markets

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2008.Includes bibliographical references (leaves 151-157).The thesis seeks a better understanding of liquidity generation process of financial markets and attempts to find a quantitative measure of market liquidity. Various statistical modeling techniques are introduced to model order flow generation, which is a liquidity generation process of the market. The order flow model successively replicates various statistical properties of price returns including fat-tailed distribution of returns, no autocorrelation of returns and strong positive autocorrelation of transaction signs. While attempting to explain how the order flow model satisfies Efficient Market Hypothesis (EMH), I discovered a method of calibrating market liquidity from order flow data.by Adlar Jeewook Kim.Ph.D

    Privacy Safe Representation Learning via Frequency Filtering Encoder

    Full text link
    Deep learning models are increasingly deployed in real-world applications. These models are often deployed on the server-side and receive user data in an information-rich representation to solve a specific task, such as image classification. Since images can contain sensitive information, which users might not be willing to share, privacy protection becomes increasingly important. Adversarial Representation Learning (ARL) is a common approach to train an encoder that runs on the client-side and obfuscates an image. It is assumed, that the obfuscated image can safely be transmitted and used for the task on the server without privacy concerns. However, in this work, we find that training a reconstruction attacker can successfully recover the original image of existing ARL methods. To this end, we introduce a novel ARL method enhanced through low-pass filtering, limiting the available information amount to be encoded in the frequency domain. Our experimental results reveal that our approach withstands reconstruction attacks while outperforming previous state-of-the-art methods regarding the privacy-utility trade-off. We further conduct a user study to qualitatively assess our defense of the reconstruction attack.Comment: The IJCAI-ECAI-22 Workshop on Artificial Intelligence Safety (AISafety 2022
    corecore