In the era of quantitative investment, factor-based investing models are widely adopted in the construction of stock portfolios. These models explain the performance of individual stocks by a set of financial factors,...
详细信息
In the era of quantitative investment, factor-based investing models are widely adopted in the construction of stock portfolios. These models explain the performance of individual stocks by a set of financial factors, e.g., market beta and company size. In industry, open investment platforms allow the online building of factor-based models, yet set a high bar on the engineering expertise of end-users. State-of-the-art visualization systems integrate the whole factor investing pipeline, but do not directly address domain users' core requests on ranking factors and stocks for portfolio construction. The current model lacks explainability, which downgrades its credibility with stock investors. To fill the gap in modeling, ranking, and visualizing stock time series for factor investment, we designed and implemented a visual analytics system, namely RankFIRST. The system offers built-in support for an established factor collection and a cross-sectional regression model viable for human interpretation. A hierarchical slope graph design is introduced according to the desired characteristics of good factors for stock investment. A novel firework chart is also invented extending the well-known candlestick chart for stock time series. We evaluated the system on the full-scale Chinese stock market data in the recent 30 years. Case studies and controlled user evaluation demonstrate the superiority of our system on factor investing, in comparison to both passive investing on stock indices and existing stock market visual analytics tools. IEEE
Intelligent reflecting surface (IRS) is regarded as a promising technique to control wireless channels for improving the communication and/or sensing performance of wireless systems. In this paper, we propose a new ta...
Intelligent reflecting surface (IRS) is regarded as a promising technique to control wireless channels for improving the communication and/or sensing performance of wireless systems. In this paper, we propose a new target-mounted IRS approach for wireless sensing, where IRS is mounted on the outer/echo surface of a target for either enhancing the IRS/target reflected signal towards the legitimate radar station (LRS) to facilitate its detection of the target, or suppressing that towards the unauthorized radar station (URS) to prevent its detection of the target, by flexibly tuning the IRS reflection. To this end, we assume that sensors are installed along with the reflecting elements at IRS to detect the angles of arrival (AoA) of radar signals from the LRS/URS, based on which IRS reflection is designed to achieve signal enhancement/suppression in the angle of departure (AoD) towards the LRS/URS, respectively. Simulation results are presented to verify the performance of the proposed controllable wireless sensing approach with target-mounted IRS, as compared to various benchmark schemes.
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
详细信息
This paper investigates joint location and power optimization for secure communication in a multi-unmanned acrial vehicles (U A V s) enabled cellular network consisting of interference link, eavesdropping link, cellul...
This paper investigates joint location and power optimization for secure communication in a multi-unmanned acrial vehicles (U A V s) enabled cellular network consisting of interference link, eavesdropping link, cellular link and D2D link. To this end, we first derive the expression of secure rate. Then, we formulate the maximization of secure rate as a constrained optimization problem. Finally, we solve it using the method of exhaustion.
Commit messages are natural language descriptions of code changes, which are important for software evolution such as code understanding and maintenance. However, previous methods are trained on the entire dataset wit...
详细信息
As a promising technology, key-aggregation searchable encryption with constant computation overhead is especially suitable for sensor nodes with limited computation resources in wireless sensor networks. However, in m...
详细信息
As a promising technology, key-aggregation searchable encryption with constant computation overhead is especially suitable for sensor nodes with limited computation resources in wireless sensor networks. However, in most of the existing key-aggregation searchable encryption schemes, the authorized aggregation key is generated in a deterministic way. As a result, these schemes suffer from “ Key Forge Attack ” and “ Trapdoor Forge Attack ” that we proposed and hence fail to support the security property as they claimed (which is an important goal to be achieved in key-aggregation searchable encryption schemes). To fix these flaws, in this paper, we identify the security challenges related to key-aggregation searchable encryption and propose a lightweight key-aggregation authorized searchable encryption scheme based on attribute-based encryption, called KA $^{2}$ SE. It enables a data owner to share encrypted data with an authorized query user by issuing only a single authorized aggregation key, and the authorized query user only needs to submit a single trapdoor to the cloud server to perform keyword search. We formulate the security definitions for KA $^{2}$ SE and prove its security. Finally, empirical evaluations demonstrate that KA $^{2}$ SE is computationally efficient in comparison with existing schemes.
This paper establishes the iteration-complexity of proximal bundle methods for solving hybrid (i.e., a blend of smooth and nonsmooth) weakly convex composite optimization (HWC-CO) problems. This is done in a unified m...
详细信息
In this paper, we proposed a design method for photonic crystal fiber polarization filters incorporating artificial neural network (ANN) and genetic algorithm (GA) to achieve high-performance polarization filters. The...
详细信息
In recent years, the results of view-based 3D shape recognition methods have saturated, and models with excellent performance cannot be deployed on memory-limited devices due to their huge size of parameters. To addre...
详细信息
With the development of computational fluid dynamics, the requirements for the fluid simulation accuracy in industrial applications have also increased. The quality of the generated mesh directly affects the simulatio...
详细信息
暂无评论