1 code implementation • 19 Oct 2020 • Elior Nehemya, Yael Mathov, Asaf Shabtai, Yuval Elovici
In this study, we present a realistic scenario in which an attacker influences algorithmic trading systems by using adversarial learning techniques to manipulate the input data stream in real time.