Label Augmentation via Time-based Knowledge Distillation for Financial
Anomaly Detection
- URL: http://arxiv.org/abs/2101.01689v1
- Date: Tue, 5 Jan 2021 18:24:13 GMT
- Title: Label Augmentation via Time-based Knowledge Distillation for Financial
Anomaly Detection
- Authors: Hongda Shen, Eren Kursun
- Abstract summary: Financial anomaly detection use cases face serious challenges due to the dynamic nature of the underlying patterns.
Keeping up with the rapid changes introduces other challenges as it moves the model away from older patterns or continuously grows the size of the training data.
We propose a label augmentation approach to utilize the learning from older models to boost the latest.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Detecting anomalies has become increasingly critical to the financial service
industry. Anomalous events are often indicative of illegal activities such as
fraud, identity theft, network intrusion, account takeover, and money
laundering. Financial anomaly detection use cases face serious challenges due
to the dynamic nature of the underlying patterns especially in adversarial
environments such as constantly changing fraud tactics. While retraining the
models with the new patterns is absolutely essential; keeping up with the rapid
changes introduces other challenges as it moves the model away from older
patterns or continuously grows the size of the training data. The resulting
data growth is hard to manage and it reduces the agility of the models'
response to the latest attacks. Due to the data size limitations and the need
to track the latest patterns, older time periods are often dropped in practice,
which in turn, causes vulnerabilities. In this study, we propose a label
augmentation approach to utilize the learning from older models to boost the
latest. Experimental results show that the proposed approach provides a
significant reduction in training time, while providing potential performance
improvement.
Related papers
- Living-off-The-Land Reverse-Shell Detection by Informed Data
Augmentation [16.06998078829495]
Living-off-the-land (LOTL) offensive methodologies rely on perpetration of malicious actions through chains of commands executed by legitimate applications.
LOTL techniques are well hidden inside the stream of events generated by common legitimate activities.
We propose an augmentation framework to enhance and diversify the presence of LOTL malicious activity inside legitimate logs.
arXiv Detail & Related papers (2024-02-28T13:49:23Z) - Temporal Knowledge Distillation for Time-Sensitive Financial Services
Applications [7.1795069620810805]
Anomaly detection is frequently used in key compliance and risk functions such as financial crime detection fraud and cybersecurity.
Keeping up with the rapid changes by retraining the models with the latest data patterns introduces pressures in balancing the historical and current patterns.
The proposed approach provides advantages in retraining times while improving the model performance.
arXiv Detail & Related papers (2023-12-28T03:04:30Z) - Model Stealing Attack against Graph Classification with Authenticity, Uncertainty and Diversity [80.16488817177182]
GNNs are vulnerable to the model stealing attack, a nefarious endeavor geared towards duplicating the target model via query permissions.
We introduce three model stealing attacks to adapt to different actual scenarios.
arXiv Detail & Related papers (2023-12-18T05:42:31Z) - GADY: Unsupervised Anomaly Detection on Dynamic Graphs [18.1896489628884]
We propose a continuous dynamic graph model to capture the fine-grained information, which breaks the limit of existing discrete methods.
For the second challenge, we pioneer the use of Generative Adversarial Networks to generate negative interactions.
Our proposed GADY significantly outperforms the previous state-of-the-art method on three real-world datasets.
arXiv Detail & Related papers (2023-10-25T05:27:45Z) - Towards Robust Continual Learning with Bayesian Adaptive Moment Regularization [51.34904967046097]
Continual learning seeks to overcome the challenge of catastrophic forgetting, where a model forgets previously learnt information.
We introduce a novel prior-based method that better constrains parameter growth, reducing catastrophic forgetting.
Results show that BAdam achieves state-of-the-art performance for prior-based methods on challenging single-headed class-incremental experiments.
arXiv Detail & Related papers (2023-09-15T17:10:51Z) - Designing an attack-defense game: how to increase robustness of
financial transaction models via a competition [69.08339915577206]
Given the escalating risks of malicious attacks in the finance sector, understanding adversarial strategies and robust defense mechanisms for machine learning models is critical.
We aim to investigate the current state and dynamics of adversarial attacks and defenses for neural network models that use sequential financial data as the input.
We have designed a competition that allows realistic and detailed investigation of problems in modern financial transaction data.
The participants compete directly against each other, so possible attacks and defenses are examined in close-to-real-life conditions.
arXiv Detail & Related papers (2023-08-22T12:53:09Z) - Enhancing Multiple Reliability Measures via Nuisance-extended
Information Bottleneck [77.37409441129995]
In practical scenarios where training data is limited, many predictive signals in the data can be rather from some biases in data acquisition.
We consider an adversarial threat model under a mutual information constraint to cover a wider class of perturbations in training.
We propose an autoencoder-based training to implement the objective, as well as practical encoder designs to facilitate the proposed hybrid discriminative-generative training.
arXiv Detail & Related papers (2023-03-24T16:03:21Z) - Data Poisoning Attack Aiming the Vulnerability of Continual Learning [25.480762565632332]
We present a simple task-specific data poisoning attack that can be used in the learning process of a new task.
We experiment with the attack on the two representative regularization-based continual learning methods.
arXiv Detail & Related papers (2022-11-29T02:28:05Z) - Augmented Bilinear Network for Incremental Multi-Stock Time-Series
Classification [83.23129279407271]
We propose a method to efficiently retain the knowledge available in a neural network pre-trained on a set of securities.
In our method, the prior knowledge encoded in a pre-trained neural network is maintained by keeping existing connections fixed.
This knowledge is adjusted for the new securities by a set of augmented connections, which are optimized using the new data.
arXiv Detail & Related papers (2022-07-23T18:54:10Z) - CausalAgents: A Robustness Benchmark for Motion Forecasting using Causal
Relationships [8.679073301435265]
We construct a new benchmark for evaluating and improving model robustness by applying perturbations to existing data.
We use these labels to perturb the data by deleting non-causal agents from the scene.
Under non-causal perturbations, we observe a $25$-$38%$ relative change in minADE as compared to the original.
arXiv Detail & Related papers (2022-07-07T21:28:23Z) - Explainable Adversarial Attacks in Deep Neural Networks Using Activation
Profiles [69.9674326582747]
This paper presents a visual framework to investigate neural network models subjected to adversarial examples.
We show how observing these elements can quickly pinpoint exploited areas in a model.
arXiv Detail & Related papers (2021-03-18T13:04:21Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.