Search Results for author: Radu State

Found 25 papers, 9 papers with code

Cross Domain Early Crop Mapping using CropGAN and CNN Classifier

no code implementations15 Jan 2024 Yiqun Wang, Hui Huang, Radu State

Instead, it learns a mapping function to transform the spectral features of the target domain to the source domain (with labels) while preserving their local structure.

Generative Adversarial Network

Know Your Model (KYM): Increasing Trust in AI and Machine Learning

no code implementations31 May 2021 Mary Roszel, Robert Norvill, Jean Hilger, Radu State

The widespread utilization of AI systems has drawn attention to the potential impacts of such systems on society.

BIG-bench Machine Learning

Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain

1 code implementation5 Feb 2021 Christof Ferreira Torres, Ramiro Camino, Radu State

Ethereum prospered the inception of a plethora of smart contract applications, ranging from gambling games to decentralized finance.

Cryptography and Security

A Data Science Approach for Honeypot Detection in Ethereum

1 code implementation3 Oct 2019 Ramiro Camino, Christof Ferreira Torres, Mathis Baden, Radu State

To this end, we add transaction aggregated features, such as the number of transactions and the corresponding mean value and other contract features, for example compilation information and source code length.

SynGAN: Towards Generating Synthetic Network Attacks using GANs

no code implementations26 Aug 2019 Jeremy Charlier, Aman Singh, Gaston Ormazabal, Radu State, Henning Schulzrinne

SynGAN generates malicious packet flow mutations using real attack traffic, which can improve NIDS attack detection rates.

Network Intrusion Detection

MQLV: Optimal Policy of Money Management in Retail Banking with Q-Learning

no code implementations24 May 2019 Jeremy Charlier, Gaston Ormazabal, Radu State, Jean Hilger

We propose MQLV, Modified Q-Learner for the Vasicek model, a new reinforcement learning approach that determines the optimal policy of money management based on the aggregated financial transactions of the clients.

Decision Making Management +4

Visualization of AE's Training on Credit Card Transactions with Persistent Homology

no code implementations24 May 2019 Jeremy Charlier, Francois Petit, Gaston Ormazabal, Radu State, Jean Hilger

PHom-WAE minimizes the Wasserstein distance between the true distribution and the reconstructed distribution and uses persistent homology, the study of the topological features of a space at different spatial resolutions, to compare the nature of the latent manifold and the reconstructed distribution.

Dimensionality Reduction

User-Device Authentication in Mobile Banking using APHEN for Paratuck2 Tensor Decomposition

no code implementations23 May 2019 Jeremy Charlier, Eric Falk, Radu State, Jean Hilger

Nonetheless, the retail banks are looking to leverage the user-device authentication on the mobile banking applications to enhance the personal financial advertisement.

Tensor Decomposition

PHom-GeM: Persistent Homology for Generative Models

1 code implementation23 May 2019 Jeremy Charlier, Radu State, Jean Hilger

PHom-GeM minimizes an objective function between the true and the reconstructed distributions and uses persistent homology, the study of the topological features of a space at different spatial resolutions, to compare the nature of the true and the generated distributions.

Generative Adversarial Network

Predicting Sparse Clients' Actions with CPOPT-Net in the Banking Environment

1 code implementation23 May 2019 Jeremy Charlier, Radu State, Jean Hilger

The digital revolution of the banking system with evolving European regulations have pushed the major banking actors to innovate by a newly use of their clients' digital information.

Tensor Decomposition Time Series +1

Improving Missing Data Imputation with Deep Generative Models

1 code implementation27 Feb 2019 Ramiro D. Camino, Christian A. Hammerschmidt, Radu State

Datasets with missing values are very common on industry applications, and they can have a negative impact on machine learning models.

Imputation

The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts

1 code implementation19 Feb 2019 Christof Ferreira Torres, Mathis Steichen, Radu State

We identify 690 honeypot smart contracts as well as 240 victims in the wild, with an accumulated profit of more than $90, 000 for the honeypot creators.

Cryptography and Security

Generating Multi-Categorical Samples with Generative Adversarial Networks

2 code implementations3 Jul 2018 Ramiro Camino, Christian Hammerschmidt, Radu State

We propose a method to train generative adversarial networks on mutivariate feature vectors representing multiple categorical values.

Impact of Biases in Big Data

no code implementations2 Mar 2018 Patrick Glauner, Petko Valtchev, Radu State

In this work, we provide a review of different sorts of biases in (big) data sets in machine learning.

BIG-bench Machine Learning

On the Reduction of Biases in Big Data Sets for the Detection of Irregular Power Usage

no code implementations17 Jan 2018 Patrick Glauner, Radu State, Petko Valtchev, Diogo Duarte

Our models have the potential to generate significant economic value in a real world application, as they are being deployed in a commercial software for the detection of irregular power usage.

BIG-bench Machine Learning

Identifying Irregular Power Usage by Turning Predictions into Holographic Spatial Visualizations

no code implementations9 Sep 2017 Patrick Glauner, Niklas Dahringer, Oleksandr Puhachov, Jorge Augusto Meira, Petko Valtchev, Radu State, Diogo Duarte

Second, in order to allow human experts to feed their knowledge in the decision loop, we propose a method for visualizing prediction results at various granularity levels in a spatial hologram.

Decision Making

Human in the Loop: Interactive Passive Automata Learning via Evidence-Driven State-Merging Algorithms

no code implementations28 Jul 2017 Christian A. Hammerschmidt, Radu State, Sicco Verwer

We present an interactive version of an evidence-driven state-merging (EDSM) algorithm for learning variants of finite state automata.

Neighborhood Features Help Detecting Non-Technical Losses in Big Data Sets

no code implementations4 Jul 2016 Patrick Glauner, Jorge Meira, Lautaro Dolberg, Radu State, Franck Bettinger, Yves Rangoni, Diogo Duarte

Using the neighborhood features instead of only analyzing the time series has resulted in appreciable results for Big Data sets for varying NTL proportions of 1%-90%.

Time Series Time Series Analysis

The Challenge of Non-Technical Loss Detection using Artificial Intelligence: A Survey

no code implementations2 Jun 2016 Patrick Glauner, Jorge Augusto Meira, Petko Valtchev, Radu State, Franck Bettinger

Detection of non-technical losses (NTL) which include electricity theft, faulty meters or billing errors has attracted increasing attention from researchers in electrical engineering and computer science.

Electrical Engineering

Large-Scale Detection of Non-Technical Losses in Imbalanced Data Sets

no code implementations26 Feb 2016 Patrick O. Glauner, Andre Boechat, Lautaro Dolberg, Radu State, Franck Bettinger, Yves Rangoni, Diogo Duarte

We believe that the considerations and observations made in this contribution are necessary for future smart meter research in order to report their effectiveness on imbalanced and large real world data sets.

Small Data Image Classification

Cannot find the paper you are looking for? You can Submit a new open access paper.