Detecting Suspicious Events in Fast Information Flows
- URL: http://arxiv.org/abs/2101.02424v1
- Date: Thu, 7 Jan 2021 08:19:25 GMT
- Title: Detecting Suspicious Events in Fast Information Flows
- Authors: Kristiaan Pelckmans, Moustafa Aboushady, Andreas Brosemyr
- Abstract summary: We describe a computational feather-light and intuitive, yet provably efficient algorithm, named HALFADO.
HALFADO is designed for detecting suspicious events in a high-frequency stream of complex entries, based on a relatively small number of examples of human judgement.
We illustrate HALFADO's efficacy on two challenging applications: (1) for detecting em hate speech messages in a flow of text messages gathered from a social media platform, and (2) for a Transaction Monitoring System (TMS) in detecting fraudulent transactions in a stream of financial transactions.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: We describe a computational feather-light and intuitive, yet provably
efficient algorithm, named HALFADO. HALFADO is designed for detecting
suspicious events in a high-frequency stream of complex entries, based on a
relatively small number of examples of human judgement. Operating a
sufficiently accurate detection system is vital for {\em assisting} teams of
human experts in many different areas of the modern digital society. These
systems have intrinsically a far-reaching normative effect, and public
knowledge of the workings of such technology should be a human right.
On a conceptual level, the present approach extends one of the most classical
learning algorithms for classification, inheriting its theoretical properties.
It however works in a semi-supervised way integrating human and computational
intelligence. On a practical level, this algorithm transcends existing
approaches (expert systems) by managing and boosting their performance into a
single global detector.
We illustrate HALFADO's efficacy on two challenging applications: (1) for
detecting {\em hate speech} messages in a flow of text messages gathered from a
social media platform, and (2) for a Transaction Monitoring System (TMS) in
FinTech detecting fraudulent transactions in a stream of financial
transactions.
This algorithm illustrates that - contrary to popular belief - advanced
methods of machine learning need not require neither advanced levels of
computation power nor expensive annotation efforts.
Related papers
- Token-Level Adversarial Prompt Detection Based on Perplexity Measures
and Contextual Information [67.78183175605761]
Large Language Models are susceptible to adversarial prompt attacks.
This vulnerability underscores a significant concern regarding the robustness and reliability of LLMs.
We introduce a novel approach to detecting adversarial prompts at a token level.
arXiv Detail & Related papers (2023-11-20T03:17:21Z) - Measuring, Interpreting, and Improving Fairness of Algorithms using
Causal Inference and Randomized Experiments [8.62694928567939]
We present an algorithm-agnostic framework (MIIF) to Measure, Interpret, and Improve the Fairness of an algorithmic decision.
We measure the algorithm bias using randomized experiments, which enables the simultaneous measurement of disparate treatment, disparate impact, and economic value.
We also develop an explainable machine learning model which accurately interprets and distills the beliefs of a blackbox algorithm.
arXiv Detail & Related papers (2023-09-04T19:45:18Z) - Representation Learning with Multi-Step Inverse Kinematics: An Efficient
and Optimal Approach to Rich-Observation RL [106.82295532402335]
Existing reinforcement learning algorithms suffer from computational intractability, strong statistical assumptions, and suboptimal sample complexity.
We provide the first computationally efficient algorithm that attains rate-optimal sample complexity with respect to the desired accuracy level.
Our algorithm, MusIK, combines systematic exploration with representation learning based on multi-step inverse kinematics.
arXiv Detail & Related papers (2023-04-12T14:51:47Z) - Interpretable Anomaly Detection via Discrete Optimization [1.7150329136228712]
We propose a framework for learning inherently interpretable anomaly detectors from sequential data.
We show that this problem is computationally hard and develop two learning algorithms based on constraint optimization.
Using a prototype implementation, we demonstrate that our approach shows promising results in terms of accuracy and F1 score.
arXiv Detail & Related papers (2023-03-24T16:19:15Z) - Should All Proposals be Treated Equally in Object Detection? [110.27485090952385]
The complexity-precision trade-off of an object detector is a critical problem for resource constrained vision tasks.
It is hypothesized that improved detection efficiency requires a paradigm shift, towards the unequal processing of proposals.
This results in better utilization of available computational budget, enabling higher accuracy for the same FLOPS.
arXiv Detail & Related papers (2022-07-07T18:26:32Z) - Robustification of Online Graph Exploration Methods [59.50307752165016]
We study a learning-augmented variant of the classical, notoriously hard online graph exploration problem.
We propose an algorithm that naturally integrates predictions into the well-known Nearest Neighbor (NN) algorithm.
arXiv Detail & Related papers (2021-12-10T10:02:31Z) - Incremental Learning Techniques for Online Human Activity Recognition [0.0]
We propose a human activity recognition (HAR) approach for the online prediction of physical movements.
We develop a HAR system containing monitoring software and a mobile application that collects accelerometer and gyroscope data.
Six incremental learning algorithms are employed and evaluated in this work and compared with several batch learning algorithms commonly used for developing offline HAR systems.
arXiv Detail & Related papers (2021-09-20T11:33:09Z) - HURRA! Human readable router anomaly detection [11.564082628014638]
HURRA aims to reduce the time spent by human operators in the process of network troubleshooting.
It comprises two modules that are plugged after any anomaly detection algorithm.
arXiv Detail & Related papers (2021-07-23T08:38:29Z) - MURAL: Meta-Learning Uncertainty-Aware Rewards for Outcome-Driven
Reinforcement Learning [65.52675802289775]
We show that an uncertainty aware classifier can solve challenging reinforcement learning problems.
We propose a novel method for computing the normalized maximum likelihood (NML) distribution.
We show that the resulting algorithm has a number of intriguing connections to both count-based exploration methods and prior algorithms for learning reward functions.
arXiv Detail & Related papers (2021-07-15T08:19:57Z) - Network Activities Recognition and Analysis Based on Supervised Machine
Learning Classification Methods Using J48 and Na\"ive Bayes Algorithm [1.6181085766811525]
The application of machine learning methods based on supervised classification technology would help liberate the network security staff from the heavy and boring tasks.
A finetuned model would accurately recognize user behavior, which could provide persistent monitoring with a relative high accuracy and good adaptability.
arXiv Detail & Related papers (2021-05-28T09:44:14Z) - MixNet for Generalized Face Presentation Attack Detection [63.35297510471997]
We have proposed a deep learning-based network termed as textitMixNet to detect presentation attacks.
The proposed algorithm utilizes state-of-the-art convolutional neural network architectures and learns the feature mapping for each attack category.
arXiv Detail & Related papers (2020-10-25T23:01:13Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.