Picture for João Tiago Ascensão

João Tiago Ascensão

Adversarial training for tabular data with attack propagation

Add code
Jul 28, 2023
Figure 1 for Adversarial training for tabular data with attack propagation
Figure 2 for Adversarial training for tabular data with attack propagation
Figure 3 for Adversarial training for tabular data with attack propagation
Figure 4 for Adversarial training for tabular data with attack propagation
Viaarxiv icon

The GANfather: Controllable generation of malicious activity to improve defence systems

Add code
Jul 25, 2023
Figure 1 for The GANfather: Controllable generation of malicious activity to improve defence systems
Figure 2 for The GANfather: Controllable generation of malicious activity to improve defence systems
Figure 3 for The GANfather: Controllable generation of malicious activity to improve defence systems
Figure 4 for The GANfather: Controllable generation of malicious activity to improve defence systems
Viaarxiv icon

Lightweight Automated Feature Monitoring for Data Streams

Add code
Jul 19, 2022
Figure 1 for Lightweight Automated Feature Monitoring for Data Streams
Figure 2 for Lightweight Automated Feature Monitoring for Data Streams
Figure 3 for Lightweight Automated Feature Monitoring for Data Streams
Figure 4 for Lightweight Automated Feature Monitoring for Data Streams
Viaarxiv icon

Anti-Money Laundering Alert Optimization Using Machine Learning with Graphs

Add code
Dec 14, 2021
Figure 1 for Anti-Money Laundering Alert Optimization Using Machine Learning with Graphs
Figure 2 for Anti-Money Laundering Alert Optimization Using Machine Learning with Graphs
Figure 3 for Anti-Money Laundering Alert Optimization Using Machine Learning with Graphs
Figure 4 for Anti-Money Laundering Alert Optimization Using Machine Learning with Graphs
Viaarxiv icon

Active learning for online training in imbalanced data streams under cold start

Add code
Jul 16, 2021
Figure 1 for Active learning for online training in imbalanced data streams under cold start
Figure 2 for Active learning for online training in imbalanced data streams under cold start
Figure 3 for Active learning for online training in imbalanced data streams under cold start
Figure 4 for Active learning for online training in imbalanced data streams under cold start
Viaarxiv icon

GuiltyWalker: Distance to illicit nodes in the Bitcoin network

Add code
Feb 10, 2021
Figure 1 for GuiltyWalker: Distance to illicit nodes in the Bitcoin network
Figure 2 for GuiltyWalker: Distance to illicit nodes in the Bitcoin network
Figure 3 for GuiltyWalker: Distance to illicit nodes in the Bitcoin network
Figure 4 for GuiltyWalker: Distance to illicit nodes in the Bitcoin network
Viaarxiv icon

Machine learning methods to detect money laundering in the Bitcoin blockchain in the presence of label scarcity

Add code
May 29, 2020
Figure 1 for Machine learning methods to detect money laundering in the Bitcoin blockchain in the presence of label scarcity
Figure 2 for Machine learning methods to detect money laundering in the Bitcoin blockchain in the presence of label scarcity
Figure 3 for Machine learning methods to detect money laundering in the Bitcoin blockchain in the presence of label scarcity
Figure 4 for Machine learning methods to detect money laundering in the Bitcoin blockchain in the presence of label scarcity
Viaarxiv icon

ARMS: Automated rules management system for fraud detection

Add code
Feb 14, 2020
Figure 1 for ARMS: Automated rules management system for fraud detection
Figure 2 for ARMS: Automated rules management system for fraud detection
Figure 3 for ARMS: Automated rules management system for fraud detection
Figure 4 for ARMS: Automated rules management system for fraud detection
Viaarxiv icon

Interleaved Sequence RNNs for Fraud Detection

Add code
Feb 14, 2020
Figure 1 for Interleaved Sequence RNNs for Fraud Detection
Figure 2 for Interleaved Sequence RNNs for Fraud Detection
Figure 3 for Interleaved Sequence RNNs for Fraud Detection
Figure 4 for Interleaved Sequence RNNs for Fraud Detection
Viaarxiv icon