-
Unified Approach for Hedging Impermanent Loss of Liquidity Provision
Authors:
Alexander Lipton,
Vladimir Lucic,
Artur Sepp
Abstract:
We develop static and dynamic approaches for hedging of the impermanent loss (IL) of liquidity provision (LP) staked at Decentralised Exchanges (DEXes) which employ Uniswap V2 and V3 protocols. We provide detailed definitions and formulas for computing the IL to unify different definitions occurring in the existing literature. We show that the IL can be seen a contingent claim with a non-linear pa…
▽ More
We develop static and dynamic approaches for hedging of the impermanent loss (IL) of liquidity provision (LP) staked at Decentralised Exchanges (DEXes) which employ Uniswap V2 and V3 protocols. We provide detailed definitions and formulas for computing the IL to unify different definitions occurring in the existing literature. We show that the IL can be seen a contingent claim with a non-linear payoff for a fixed maturity date. Thus, we introduce the contingent claim termed as IL protection claim which delivers the negative of IL payoff at the maturity date. We apply arbitrage-based methods for valuation and risk management of this claim. First, we develop the static model-independent replication method for the valuation of IL protection claim using traded European vanilla call and put options. We extend and generalize an existing method to show that the IL protection claim can be hedged perfectly with options if there is a liquid options market. Second, we develop the dynamic model-based approach for the valuation and hedging of IL protection claims under a risk-neutral measure. We derive analytic valuation formulas using a wide class of price dynamics for which the characteristic function is available under the risk-neutral measure. As base cases, we derive analytic valuation formulas for IL protection claim under the Black-Scholes-Merton model and the log-normal stochastic volatility model. We finally discuss estimation of risk-reward of LP staking using our results.
△ Less
Submitted 6 July, 2024;
originally announced July 2024.
-
Backdoor Attack and Defense for Deep Regression
Authors:
Xi Li,
George Kesidis,
David J. Miller,
Vladimir Lucic
Abstract:
We demonstrate a backdoor attack on a deep neural network used for regression. The backdoor attack is localized based on training-set data poisoning wherein the mislabeled samples are surrounded by correctly labeled ones. We demonstrate how such localization is necessary for attack success. We also study the performance of a backdoor defense using gradient-based discovery of local error maximizers…
▽ More
We demonstrate a backdoor attack on a deep neural network used for regression. The backdoor attack is localized based on training-set data poisoning wherein the mislabeled samples are surrounded by correctly labeled ones. We demonstrate how such localization is necessary for attack success. We also study the performance of a backdoor defense using gradient-based discovery of local error maximizers. Local error maximizers which are associated with significant (interpolation) error, and are proximal to many training samples, are suspicious. This method is also used to accurately train for deep regression in the first place by active (deep) learning leveraging an "oracle" capable of providing real-valued supervision (a regression target) for samples. Such oracles, including traditional numerical solvers of PDEs or SDEs using finite difference or Monte Carlo approximations, are far more computationally costly compared to deep regression.
△ Less
Submitted 6 September, 2021;
originally announced September 2021.
-
Robust and Active Learning for Deep Neural Network Regression
Authors:
Xi Li,
George Kesidis,
David J. Miller,
Maxime Bergeron,
Ryan Ferguson,
Vladimir Lucic
Abstract:
We describe a gradient-based method to discover local error maximizers of a deep neural network (DNN) used for regression, assuming the availability of an "oracle" capable of providing real-valued supervision (a regression target) for samples. For example, the oracle could be a numerical solver which, operationally, is much slower than the DNN. Given a discovered set of local error maximizers, the…
▽ More
We describe a gradient-based method to discover local error maximizers of a deep neural network (DNN) used for regression, assuming the availability of an "oracle" capable of providing real-valued supervision (a regression target) for samples. For example, the oracle could be a numerical solver which, operationally, is much slower than the DNN. Given a discovered set of local error maximizers, the DNN is either fine-tuned or retrained in the manner of active learning.
△ Less
Submitted 27 July, 2021;
originally announced July 2021.
-
Statistical spatial analysis for cryo-electron tomography
Authors:
Antonio Martinez-Sanchez,
Wolfgang Baumeister,
Vladan Lučić
Abstract:
Cryo-electron tomography (cryo-ET) is uniquely suited to precisely localize macromolecular complexes in situ, that is in a close-to-native state within their cellular compartments, in three-dimensions at high resolution. Point pattern analysis (PPA) allows quantitative characterization of the spatial organization of particles. However, current implementations of PPA functions are not suitable for…
▽ More
Cryo-electron tomography (cryo-ET) is uniquely suited to precisely localize macromolecular complexes in situ, that is in a close-to-native state within their cellular compartments, in three-dimensions at high resolution. Point pattern analysis (PPA) allows quantitative characterization of the spatial organization of particles. However, current implementations of PPA functions are not suitable for applications to cryo-ET data because they do not consider the real, typically irregular 3D shape of cellular compartments and molecular complexes. Here, we designed and implemented first and the second-order, uni- and bivariate PPA functions in a Python package for statistical spatial analysis of particles located in three dimensional regions of arbitrary shape, such as those encountered in cellular cryo-ET imaging (PyOrg).
To validate the implemented functions, we applied them to specially designed synthetic datasets. This allowed us to find the algorithmic solutions that provide the best accuracy and computational performance, and to evaluate the precision of the implemented functions. Applications to experimental data showed that despite the higher computational demand, the use of the second-order functions is advantageous to the first-order ones, because they allow characterization of the particle organization and statistical inference over a range of distance scales, as well as the comparative analysis between experimental groups comprising multiple tomograms.
Altogether, PyOrg is a versatile, precise, and efficient open-source software for reliable quantitative characterization of macromolecular organization within cellular compartments imaged in situ by cryo-ET, as well as to other 3D imaging systems where real-size particles are located within regions possessing complex geometry.
△ Less
Submitted 14 July, 2021;
originally announced July 2021.
-
Random Matrix Theory by the Supersymmetry Method Beyond the Sigma-Model
Authors:
Vladan Lucic
Abstract:
The leading correction to the smoothed connected energy density-density correlation function is obtained for the large energy difference, within the context of the Gaussian Random Matrix Theory. In order to achieve this result, the supersymmetry method is extended beyond the sigma-model, to include small quadratic fluctuations around the saddle point. Special care is taken to avoid the potential…
▽ More
The leading correction to the smoothed connected energy density-density correlation function is obtained for the large energy difference, within the context of the Gaussian Random Matrix Theory. In order to achieve this result, the supersymmetry method is extended beyond the sigma-model, to include small quadratic fluctuations around the saddle point. Special care is taken to avoid the potential divergence arising from the unbounded nature of the saddle point. Also, in the small energy difference regime, the leading correction to a two point correlation function is obtained.
△ Less
Submitted 24 April, 1997; v1 submitted 28 February, 1996;
originally announced February 1996.
-
Dill: An Algorithm and a Symbolic Software Package for Doing Classical Supersymmetry Calculations
Authors:
Vladan Lucic
Abstract:
An algorithm is presented that formalizes different steps in a classical Supersymmetric (SUSY) calculation. Based on the algorithm Dill, a symbolic software package, that can perform the calculations, is developed in the Mathematica programming language. While the algorithm is quite general, the package is created for the 4-D, N=1 model. Nevertheless, with little modification, the package could…
▽ More
An algorithm is presented that formalizes different steps in a classical Supersymmetric (SUSY) calculation. Based on the algorithm Dill, a symbolic software package, that can perform the calculations, is developed in the Mathematica programming language. While the algorithm is quite general, the package is created for the 4-D, N=1 model. Nevertheless, with little modification, the package could be used for other SUSY models. The package has been tested and some of the results are presented.
△ Less
Submitted 14 December, 1994;
originally announced December 1994.