22 research outputs found
An order flow model and a liquidity measure of financial markets
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2008.Includes bibliographical references (leaves 151-157).The thesis seeks a better understanding of liquidity generation process of financial markets and attempts to find a quantitative measure of market liquidity. Various statistical modeling techniques are introduced to model order flow generation, which is a liquidity generation process of the market. The order flow model successively replicates various statistical properties of price returns including fat-tailed distribution of returns, no autocorrelation of returns and strong positive autocorrelation of transaction signs. While attempting to explain how the order flow model satisfies Efficient Market Hypothesis (EMH), I discovered a method of calibrating market liquidity from order flow data.by Adlar Jeewook Kim.Ph.D
Privacy Safe Representation Learning via Frequency Filtering Encoder
Deep learning models are increasingly deployed in real-world applications.
These models are often deployed on the server-side and receive user data in an
information-rich representation to solve a specific task, such as image
classification. Since images can contain sensitive information, which users
might not be willing to share, privacy protection becomes increasingly
important. Adversarial Representation Learning (ARL) is a common approach to
train an encoder that runs on the client-side and obfuscates an image. It is
assumed, that the obfuscated image can safely be transmitted and used for the
task on the server without privacy concerns. However, in this work, we find
that training a reconstruction attacker can successfully recover the original
image of existing ARL methods. To this end, we introduce a novel ARL method
enhanced through low-pass filtering, limiting the available information amount
to be encoded in the frequency domain. Our experimental results reveal that our
approach withstands reconstruction attacks while outperforming previous
state-of-the-art methods regarding the privacy-utility trade-off. We further
conduct a user study to qualitatively assess our defense of the reconstruction
attack.Comment: The IJCAI-ECAI-22 Workshop on Artificial Intelligence Safety
(AISafety 2022