22 research outputs found

    Realistic Synthetic Financial Transactions for Anti-Money Laundering Models

    Full text link
    With the widespread digitization of finance and the increasing popularity of cryptocurrencies, the sophistication of fraud schemes devised by cybercriminals is growing. Money laundering -- the movement of illicit funds to conceal their origins -- can cross bank and national boundaries, producing complex transaction patterns. The UN estimates 2-5\% of global GDP or \$0.8 - \$2.0 trillion dollars are laundered globally each year. Unfortunately, real data to train machine learning models to detect laundering is generally not available, and previous synthetic data generators have had significant shortcomings. A realistic, standardized, publicly-available benchmark is needed for comparing models and for the advancement of the area. To this end, this paper contributes a synthetic financial transaction dataset generator and a set of synthetically generated AML (Anti-Money Laundering) datasets. We have calibrated this agent-based generator to match real transactions as closely as possible and made the datasets public. We describe the generator in detail and demonstrate how the datasets generated can help compare different Graph Neural Networks in terms of their AML abilities. In a key way, using synthetic data in these comparisons can be even better than using real data: the ground truth labels are complete, whilst many laundering transactions in real data are never detected

    CHIPS: Custom Hardware Instruction Processor Synthesis

    Full text link

    Automated Instruction-Set Extension

    No full text
    NOVELTY - The method involves traversing a tree of potential complex computer operations; and pruning the tree for optimality under constraints. The optimality comprises maximization of a function of merit. The constraints comprise a convexity constraint, a maximum-input-multiplicity constraint, or a maximum-output-multiplicity constraint. USE - For determining complex computer operation for computer application. ADVANTAGE - Enhances processing performance by automatically forming extensions from high-level application code. DETAILED DESCRIPTION - An INDEPENDENT CLAIM is also included for a system for determining a complex computer operation for a computer application

    Automatic Application-Specific Instruction-Set Extensions under Microarchitectural Constraints

    Get PDF
    Many commercial processors now o#er the possibility of extending their instruction set for a specific application---that is, to introduce customised functional units. There is a need to develop algorithms that decide automatically, from highlevel application code, which operations are to be carried out in the customised extensions. A few algorithms exist but are severely limited in the type of operation clusters they can choose and hence reduce significantly the e#ectiveness of specialisation. In this paper we introduce a more general algorithm which selects maximal-speedup convex subgraphs of the application dataflow graph under fundamental microarchitectural constraints, and which improves significantly on the state of the art
    corecore