-
Forecasting and Analysis of CSI 300 Daily Index and S&P 500 Index Based on ARMA and GARCH Models
Authors:
Ningyi Li,
Chennan Ju,
Dexiang Su,
Shuyan Wang,
Xing Tong
Abstract:
In this paper, the ARMA(0,6)-GARCH(1,1) and ARMA(2,6)-eGARCH(1,1) models are constructed by applying ARMA and GARCH models to daily data of the CSI 300 and S&P 500 indices from 2018 to 2021, and the forecasts for the next 7 steps and the corresponding VaR and ES are calculated. After testing the sensitivity of the models, the two index stocks are compared and the corresponding conclusions are pres…
▽ More
In this paper, the ARMA(0,6)-GARCH(1,1) and ARMA(2,6)-eGARCH(1,1) models are constructed by applying ARMA and GARCH models to daily data of the CSI 300 and S&P 500 indices from 2018 to 2021, and the forecasts for the next 7 steps and the corresponding VaR and ES are calculated. After testing the sensitivity of the models, the two index stocks are compared and the corresponding conclusions are presented.
△ Less
Submitted 30 November, 2023;
originally announced December 2023.
-
Prob2Vec: Mathematical Semantic Embedding for Problem Retrieval in Adaptive Tutoring
Authors:
Du Su,
Ali Yekkehkhany,
Yi Lu,
Wenmiao Lu
Abstract:
We propose a new application of embedding techniques for problem retrieval in adaptive tutoring. The objective is to retrieve problems whose mathematical concepts are similar. There are two challenges: First, like sentences, problems helpful to tutoring are never exactly the same in terms of the underlying concepts. Instead, good problems mix concepts in innovative ways, while still displaying con…
▽ More
We propose a new application of embedding techniques for problem retrieval in adaptive tutoring. The objective is to retrieve problems whose mathematical concepts are similar. There are two challenges: First, like sentences, problems helpful to tutoring are never exactly the same in terms of the underlying concepts. Instead, good problems mix concepts in innovative ways, while still displaying continuity in their relationships. Second, it is difficult for humans to determine a similarity score that is consistent across a large enough training set. We propose a hierarchical problem embedding algorithm, called Prob2Vec, that consists of abstraction and embedding steps. Prob2Vec achieves 96.88\% accuracy on a problem similarity test, in contrast to 75\% from directly applying state-of-the-art sentence embedding methods. It is interesting that Prob2Vec is able to distinguish very fine-grained differences among problems, an ability humans need time and effort to acquire. In addition, the sub-problem of concept labeling with imbalanced training data set is interesting in its own right. It is a multi-label problem suffering from dimensionality explosion, which we propose ways to ameliorate. We propose the novel negative pre-training algorithm that dramatically reduces false negative and positive ratios for classification, using an imbalanced training data set.
△ Less
Submitted 20 March, 2020;
originally announced March 2020.
-
Tight Prediction Intervals Using Expanded Interval Minimization
Authors:
Dongqi Su,
Ying Yin Ting,
Jason Ansel
Abstract:
Prediction intervals are a valuable way of quantifying uncertainty in regression problems. Good prediction intervals should be both correct, containing the actual value between the lower and upper bound at least a target percentage of the time; and tight, having a small mean width of the bounds. Many prior techniques for generating prediction intervals make assumptions on the distribution of error…
▽ More
Prediction intervals are a valuable way of quantifying uncertainty in regression problems. Good prediction intervals should be both correct, containing the actual value between the lower and upper bound at least a target percentage of the time; and tight, having a small mean width of the bounds. Many prior techniques for generating prediction intervals make assumptions on the distribution of error, which causes them to work poorly for problems with asymmetric distributions.
This paper presents Expanded Interval Minimization (EIM), a novel loss function for generating prediction intervals using neural networks. This loss function uses minibatch statistics to estimate the coverage and optimize the width of the prediction intervals. It does not make the same assumptions on the distributions of data and error as prior work. We compare to three published techniques and show EIM produces on average 1.37x tighter prediction intervals and in the worst case 1.06x tighter intervals across two large real-world datasets and varying coverage levels.
△ Less
Submitted 28 June, 2018;
originally announced June 2018.
-
Defending Against Machine Learning Model Stealing Attacks Using Deceptive Perturbations
Authors:
Taesung Lee,
Benjamin Edwards,
Ian Molloy,
Dong Su
Abstract:
Machine learning models are vulnerable to simple model stealing attacks if the adversary can obtain output labels for chosen inputs. To protect against these attacks, it has been proposed to limit the information provided to the adversary by omitting probability scores, significantly impacting the utility of the provided service. In this work, we illustrate how a service provider can still provide…
▽ More
Machine learning models are vulnerable to simple model stealing attacks if the adversary can obtain output labels for chosen inputs. To protect against these attacks, it has been proposed to limit the information provided to the adversary by omitting probability scores, significantly impacting the utility of the provided service. In this work, we illustrate how a service provider can still provide useful, albeit misleading, class probability information, while significantly limiting the success of the attack. Our defense forces the adversary to discard the class probabilities, requiring significantly more queries before they can train a model with comparable performance. We evaluate several attack strategies, model architectures, and hyperparameters under varying adversarial models, and evaluate the efficacy of our defense against the strongest adversary. Finally, we quantify the amount of noise injected into the class probabilities to mesure the loss in utility, e.g., adding 1.26 nats per query on CIFAR-10 and 3.27 on MNIST. Our evaluation shows our defense can degrade the accuracy of the stolen model at least 20%, or require up to 64 times more queries while kee** the accuracy of the protected model almost intact.
△ Less
Submitted 13 December, 2018; v1 submitted 31 May, 2018;
originally announced June 2018.
-
Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach
Authors:
Tsui-Wei Weng,
Huan Zhang,
Pin-Yu Chen,
**feng Yi,
Dong Su,
Yupeng Gao,
Cho-Jui Hsieh,
Luca Daniel
Abstract:
The robustness of neural networks to adversarial examples has received great attention due to security implications. Despite various attack approaches to crafting visually imperceptible adversarial examples, little has been developed towards a comprehensive measure of robustness. In this paper, we provide a theoretical justification for converting robustness analysis into a local Lipschitz constan…
▽ More
The robustness of neural networks to adversarial examples has received great attention due to security implications. Despite various attack approaches to crafting visually imperceptible adversarial examples, little has been developed towards a comprehensive measure of robustness. In this paper, we provide a theoretical justification for converting robustness analysis into a local Lipschitz constant estimation problem, and propose to use the Extreme Value Theory for efficient evaluation. Our analysis yields a novel robustness metric called CLEVER, which is short for Cross Lipschitz Extreme Value for nEtwork Robustness. The proposed CLEVER score is attack-agnostic and computationally feasible for large neural networks. Experimental results on various networks, including ResNet, Inception-v3 and MobileNet, show that (i) CLEVER is aligned with the robustness indication measured by the $\ell_2$ and $\ell_\infty$ norms of adversarial examples from powerful attacks, and (ii) defended networks using defensive distillation or bounded ReLU indeed achieve better CLEVER scores. To the best of our knowledge, CLEVER is the first attack-independent robustness metric that can be applied to any neural network classifier.
△ Less
Submitted 31 January, 2018;
originally announced January 2018.