Update manuscript in the readme file

This commit is contained in:
Yael Mathov 2021-08-12 10:11:29 +03:00 committed by GitHub
parent 2868757f87
commit d6e8320141
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -4,8 +4,12 @@
</h1>
<h3 align="center">
<a href="https://2021.ecmlpkdd.org/wp-content/uploads/2021/07/sub_386.pdf">
ECML\PKDD Paper
</a>
<span> | </span>
<a href="https://arxiv.org/abs/2010.09246">
Paper
Old Paper
</a>
<span> | </span>
<a href="https://github.com/nehemya/Algo-Trade-Adversarial-Examples">
@ -26,18 +30,18 @@
</p>
## About the Project
This repository contains the code for the ECML PKDD 2021 manuscript [Taking Over the Stock Market: Adversarial Perturbations Against Algorithmic Traders](https://arxiv.org/abs/2010.09246). Our study presents a realistic scenario in which an attacker influences algorithmic trading systems using adversarial learning techniques to manipulate the input data stream in real-time.
This repository contains the code for the ECML PKDD 2021 manuscript [Taking Over the Stock Market: Adversarial Perturbations Against Algorithmic Traders](https://2021.ecmlpkdd.org/wp-content/uploads/2021/07/sub_386.pdf). Our study presents a realistic scenario in which an attacker influences algorithmic trading systems using adversarial learning techniques to manipulate the input data stream in real-time.
The attacker creates a targeted universal adversarial perturbation (TUAP) that is agnostic to the target model and time of use, which remains imperceptible when added to the input stream.
Our code reads and processes the data from the [S&P 500 Intraday](https://www.kaggle.com/nickdl/snp-500-intraday-data) dataset and divides it into a set for training the alpha models, a set for crafting TUAPs, and six test sets to evaluate the attack. The training set is used to train three alpha models. Then, we use the TUAP set to craft a universal adversarial perturbation that can fool the target alpha models and evaluate the perturbations' performance. Finally, we also explore various mitigation methods. Additional information is available in the paper.
## Citation
```
@article{nehemya2020bots,
title={When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic Traders},
@article{nehemya2021taking,
title={Taking Over the Stock Market: Adversarial Perturbations Against Algorithmic Traders},
author={Nehemya, Elior and Mathov, Yael and Shabtai, Asaf and Elovici, Yuval},
journal={arXiv preprint arXiv:2010.09246},
year={2020}
booktitle={ECML-PKDD},
year={2021}
}
```