Using Transformer Models for Stock Market Anomaly Detection
Anomaly detection is an important task in financial markets. Detecting anomalies is difficult due to their rarity, multitude of parameters, and lack of labeled data for supervised learning models. Additionally, time series data used in financial models present unique challenges such as irregul...
| Main Authors: | Biriukova, Kseniia, Bhattacherjee, Anol |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
INTI International University
2023
|
| Subjects: | |
| Online Access: | http://eprints.intimal.edu.my/1848/ http://eprints.intimal.edu.my/1848/1/jods2023_21.pdf |
Similar Items
Traffic Scene Anomaly Detection
by: Lu, Cai An
Published: (2017)
by: Lu, Cai An
Published: (2017)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Anomaly Detection in Time Series Data Using Spiking Neural Network
by: Bariah, Yusob, et al.
Published: (2018)
by: Bariah, Yusob, et al.
Published: (2018)
Artificial immune system based on real valued negative selection algorithms for anomaly detection
by: Khairi, Rihab Salah
Published: (2015)
by: Khairi, Rihab Salah
Published: (2015)
RED-Based Technique for Detecting and Avoiding Anomaly Network Congestion
by: Montaser, Mohamed Mostafa, et al.
Published: (2018)
by: Montaser, Mohamed Mostafa, et al.
Published: (2018)
Fabric authenticity method using fast Fourier transformation detection
by: Norislina, Ismail, et al.
Published: (2011)
by: Norislina, Ismail, et al.
Published: (2011)
Alternate methods for anomaly detection in high-energy physics via semi-supervised learning
by: Md. Ali, Mohd. Adli, et al.
Published: (2020)
by: Md. Ali, Mohd. Adli, et al.
Published: (2020)
Temporal Impacts of Health Information Technology on Hospitals’ Financial Performance
by: Sahir, Shah, et al.
Published: (2023)
by: Sahir, Shah, et al.
Published: (2023)
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
by: Firas (M.H.) S., Najjar
Published: (2016)
by: Firas (M.H.) S., Najjar
Published: (2016)
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Essays in stock market anomalies
by: Yu, Lin
Published: (2016)
by: Yu, Lin
Published: (2016)
Refinement of generated weighted fuzzy production rules by using fuzzy neural networks for stock market prediction.
by: Md. Sap, Mohd. Noor, et al.
Published: (2005)
by: Md. Sap, Mohd. Noor, et al.
Published: (2005)
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Requirement Analysis and Digitalization of Seafood Market Management
by: Marlindawati, ., et al.
Published: (2023)
by: Marlindawati, ., et al.
Published: (2023)
Diabetic Retinopathy Detection Model using Hybrid of U-Net and Vision Transformer Algorithms
by: Mudit, Khater
Published: (2024)
by: Mudit, Khater
Published: (2024)
Experiment of Tamper Detection and Recovery Watermarking in PACS
by: Siau-Chuin, Liew, et al.
Published: (2010)
by: Siau-Chuin, Liew, et al.
Published: (2010)
A secured data hiding using affine transformation in video steganography
by: Ramalingam, Mritha, et al.
Published: (2020)
by: Ramalingam, Mritha, et al.
Published: (2020)
A blind watermarking using redundant wavelet transform for copyright protection
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
A Mobile Application For Stock Price Prediction
by: Choy, Yi Tou
Published: (2021)
by: Choy, Yi Tou
Published: (2021)
Full dynamic transformation model for spatial data from relational database to object-oriented database
by: Siew, Teck Kiong
Published: (2005)
by: Siew, Teck Kiong
Published: (2005)
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
The Use of Artificial Neural Network for Forecasting of FTSE Bursa Malaysia KLCI Stock Price Index
by: Ardiansyah, Soleh, et al.
Published: (2013)
by: Ardiansyah, Soleh, et al.
Published: (2013)
A blind watermarking technique using redundant wavelet transform for copyright protection
by: Ernawan, F., et al.
Published: (2018)
by: Ernawan, F., et al.
Published: (2018)
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
by: Hassan Disina, Abdulkadir
Published: (2018)
by: Hassan Disina, Abdulkadir
Published: (2018)
Fuzzy modelling using butterfly optimization algorithm for
phishing detection
by: Noor Syahirah, Nordin, et al.
Published: (2020)
by: Noor Syahirah, Nordin, et al.
Published: (2020)
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
by: Said, Mohamed Abdisalan
Published: (2015)
by: Said, Mohamed Abdisalan
Published: (2015)
Calendar anomalies in Pakistan stock market
by: Sobia, Quayyoum, et al.
Published: (2017)
by: Sobia, Quayyoum, et al.
Published: (2017)
Fault detection using neural network
by: Dinie, Muhammad
Published: (2008)
by: Dinie, Muhammad
Published: (2008)
Epilepsy detection using EEG signals
by: Amer, Salam, et al.
Published: (2018)
by: Amer, Salam, et al.
Published: (2018)
Detecting JFIF header using FORHEADER
by: Kamaruddin Malik, Mohamad, et al.
Published: (2011)
by: Kamaruddin Malik, Mohamad, et al.
Published: (2011)
Experiment of Tamper Detection and Recovery Watermarking in
Picture Archiving and Communication Systems
by: Siau-Chuin, Liew, et al.
Published: (2010)
by: Siau-Chuin, Liew, et al.
Published: (2010)
Die defect detection for integrated circuit using deep learning object detection techniques
by: Wong, Tack Hwa
Published: (2023)
by: Wong, Tack Hwa
Published: (2023)
Enhancement of generic code clone detection model for python application
by: Ilyana Najwa Aiza, Asmad, et al.
Published: (2022)
by: Ilyana Najwa Aiza, Asmad, et al.
Published: (2022)
Back Propagation Algorithm-Based Intelligent Model for Botnet Detection
by: Nik Quosthoni, Sunaidi, et al.
Published: (2018)
by: Nik Quosthoni, Sunaidi, et al.
Published: (2018)
Evaluating deep transfer learning models for face mask detection
by: Goh, Pei Jin
Published: (2022)
by: Goh, Pei Jin
Published: (2022)
Stock Trend Prediction Using LSTM with MA, EMA, MACD and RSI Indicators
by: Chan, Kah Him, et al.
Published: (2023)
by: Chan, Kah Him, et al.
Published: (2023)
License plate detection using deep learning object detection models
by: Leong, Kar Wan
Published: (2024)
by: Leong, Kar Wan
Published: (2024)
A review on distance measure formula for enhancing match detection process of generic code clone detection model in Java Application
by: Noormaizzattul Akmaliza, Abdullah, et al.
Published: (2021)
by: Noormaizzattul Akmaliza, Abdullah, et al.
Published: (2021)
Similar Items
-
Traffic Scene Anomaly Detection
by: Lu, Cai An
Published: (2017) -
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007) -
Anomaly Detection in Time Series Data Using Spiking Neural Network
by: Bariah, Yusob, et al.
Published: (2018) -
Artificial immune system based on real valued negative selection algorithms for anomaly detection
by: Khairi, Rihab Salah
Published: (2015) -
RED-Based Technique for Detecting and Avoiding Anomaly Network Congestion
by: Montaser, Mohamed Mostafa, et al.
Published: (2018)