Zum Hauptinhalt springen

Showing 1–11 of 11 results for author: Yen, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.02053  [pdf, other

    cs.CL cs.CE q-fin.ST

    BERTopic-Driven Stock Market Predictions: Unraveling Sentiment Insights

    Authors: Enmin Zhu, Jerome Yen

    Abstract: This paper explores the intersection of Natural Language Processing (NLP) and financial analysis, focusing on the impact of sentiment analysis in stock price prediction. We employ BERTopic, an advanced NLP technique, to analyze the sentiment of topics derived from stock market comments. Our methodology integrates this sentiment analysis with various deep learning models, renowned for their effecti… ▽ More

    Submitted 4 April, 2024; v1 submitted 2 April, 2024; originally announced April 2024.

  2. arXiv:2404.02029  [pdf, other

    cs.CE

    Enhancing Portfolio Optimization with Transformer-GAN Integration: A Novel Approach in the Black-Litterman Framework

    Authors: Enmin Zhu, Jerome Yen

    Abstract: This study presents an innovative approach to portfolio optimization by integrating Transformer models with Generative Adversarial Networks (GANs) within the Black-Litterman (BL) framework. Capitalizing on Transformers' ability to discern long-range dependencies and GANs' proficiency in generating accurate predictive models, our method enhances the generation of refined predictive views for BL por… ▽ More

    Submitted 22 April, 2024; v1 submitted 2 April, 2024; originally announced April 2024.

  3. arXiv:2311.11249  [pdf, other

    cs.LG cs.AI cs.CR

    Open Set Dandelion Network for IoT Intrusion Detection

    Authors: Jiashu Wu, Hao Dai, Kenneth B. Kent, Jerome Yen, Chengzhong Xu, Yang Wang

    Abstract: As IoT devices become widely, it is crucial to protect them from malicious intrusions. However, the data scarcity of IoT limits the applicability of traditional intrusion detection methods, which are highly data-dependent. To address this, in this paper we propose the Open-Set Dandelion Network (OSDN) based on unsupervised heterogeneous domain adaptation in an open-set manner. The OSDN model perfo… ▽ More

    Submitted 7 January, 2024; v1 submitted 19 November, 2023; originally announced November 2023.

    Comments: Accepted by ACM Transactions on Internet Technology

  4. arXiv:2211.16082  [pdf

    cs.CR cs.DC

    Safeguarding the Unseen: a Study on Data Privacy in DeFi Protocols

    Authors: Zhuangtong Huang, Jiawei Zhu, Zhongyu Huang, Yixin Xu, Jerome Yen, Ye Wang

    Abstract: The financial sector's adoption of technology-driven data analysis has enhanced operational efficiency and revenue generation by leveraging personal sensitive data. However, the inherent characteristics of blockchain hinder decentralized finance (DeFi) from accessing necessary sensitive user data. To address this challenge, we introduce a protocol that both safeguards user privacy and ensures data… ▽ More

    Submitted 10 November, 2023; v1 submitted 29 November, 2022; originally announced November 2022.

  5. arXiv:2108.00079  [pdf, other

    cs.CR cs.LG

    Zooming Into the Darknet: Characterizing Internet Background Radiation and its Structural Changes

    Authors: Michalis Kallitsis, Vasant Honavar, Rupesh Prajapati, Dinghao Wu, John Yen

    Abstract: Network telescopes or "Darknets" provide a unique window into Internet-wide malicious activities associated with malware propagation, denial of service attacks, scanning performed for network reconnaissance, and others. Analyses of the resulting data can provide actionable insights to security analysts that can be used to prevent or mitigate cyber-threats. Large Darknets, however, observe millions… ▽ More

    Submitted 5 August, 2021; v1 submitted 28 July, 2021; originally announced August 2021.

    Comments: 30 pages, 14 tables, 12 figures, arXiv.org perpetual, non-exclusive license

  6. arXiv:2010.04801  [pdf, other

    cs.NI

    Semi-Automated Protocol Disambiguation and Code Generation

    Authors: Jane Yen, Tamás Lévai, Qinyuan Ye, Xiang Ren, Ramesh Govindan, Barath Raghavan

    Abstract: For decades, Internet protocols have been specified using natural language. Given the ambiguity inherent in such text, it is not surprising that protocol implementations have long exhibited bugs. In this paper, we apply natural language processing (NLP) to effect semi-automated generation of protocol implementations from specification text. Our system, SAGE, can uncover ambiguous or under-specifie… ▽ More

    Submitted 1 February, 2021; v1 submitted 9 October, 2020; originally announced October 2020.

  7. arXiv:1304.2731  [pdf

    cs.AI

    Implementing Evidential Reasoning in Expert Systems

    Authors: John Yen

    Abstract: The Dempster-Shafer theory has been extended recently for its application to expert systems. However, implementing the extended D-S reasoning model in rule-based systems greatly complicates the task of generating informative explanations. By implementing GERTIS, a prototype system for diagnosing rheumatoid arthritis, we show that two kinds of knowledge are essential for explanation generation: (l)… ▽ More

    Submitted 27 March, 2013; originally announced April 2013.

    Comments: Appears in Proceedings of the Third Conference on Uncertainty in Artificial Intelligence (UAI1987)

    Report number: UAI-P-1987-PG-180-188

  8. arXiv:1304.2718  [pdf

    cs.AI

    Can Evidence Be Combined in the Dempster-Shafer Theory

    Authors: John Yen

    Abstract: Dempster's rule of combination has been the most controversial part of the Dempster-Shafer (D-S) theory. In particular, Zadeh has reached a conjecture on the noncombinability of evidence from a relational model of the D-S theory. In this paper, we will describe another relational model where D-S masses are represented as conditional granular distributions. By comparing it with Zadeh's relational m… ▽ More

    Submitted 27 March, 2013; originally announced April 2013.

    Comments: Appears in Proceedings of the Third Conference on Uncertainty in Artificial Intelligence (UAI1987)

    Report number: UAI-P-1987-PG-70-76

  9. arXiv:1304.2383  [pdf

    cs.AI

    Generalizing the Dempster-Shafer Theory to Fuzzy Sets

    Authors: John Yen

    Abstract: With the desire to apply the Dempster-Shafer theory to complex real world problems where the evidential strength is often imprecise and vague, several attempts have been made to generalize the theory. However, the important concept in the D-S theory that the belief and plausibility functions are lower and upper probabilities is no longer preserved in these generalizations. In this paper, we desc… ▽ More

    Submitted 27 March, 2013; originally announced April 2013.

    Comments: Appears in Proceedings of the Fourth Conference on Uncertainty in Artificial Intelligence (UAI1988)

    Report number: UAI-P-1988-PG-382-391

  10. arXiv:1304.1137  [pdf

    cs.AI

    Extending Term Subsumption systems for Uncertainty Management

    Authors: John Yen, Piero P. Bonissone

    Abstract: A major difficulty in developing and maintaining very large knowledge bases originates from the variety of forms in which knowledge is made available to the KB builder. The objective of this research is to bring together two complementary knowledge representation schemes: term subsumption languages, which represent and reason about defining characteristics of concepts, and proximate reasoning mode… ▽ More

    Submitted 27 March, 2013; originally announced April 2013.

    Comments: Appears in Proceedings of the Sixth Conference on Uncertainty in Artificial Intelligence (UAI1990)

    Report number: UAI-P-1990-PG-468-474

  11. arXiv:1211.6086  [pdf

    cs.SI cs.CY physics.soc-ph

    Finding influential users of an online health community: a new metric based on sentiment influence

    Authors: Kang Zhao, Greta Greer, Baojun Qiu, Prasenjit Mitra, Kenneth Portier, John Yen

    Abstract: What characterizes influential users in online health communities (OHCs)? We hypothesize that (1) the emotional support received by OHC members can be assessed from their sentiment ex-pressed in online interactions, and (2) such assessments can help to identify influential OHC members. Through text mining and sentiment analysis of users' online interactions, we propose a novel metric that directly… ▽ More

    Submitted 5 December, 2012; v1 submitted 26 November, 2012; originally announced November 2012.

    Comments: Working paper