8 results on '"Sameena Shah"'
Search Results
2. Simulating and classifying behavior in adversarial environments based on action-state traces
- Author
-
Manuela Veloso, Sameena Shah, and Daniel Borrajo
- Subjects
FOS: Computer and information sciences ,Flexibility (engineering) ,Computer Science - Artificial Intelligence ,I.2.6 ,Computer science ,I.2.8 ,Context (language use) ,Adversary ,Money laundering ,Data science ,Adversarial system ,Artificial Intelligence (cs.AI) ,Action (philosophy) ,Key (cryptography) ,Representation (mathematics) - Abstract
Many business applications involve adversarial relationships in which both sides adapt their strategies to optimize their opposing benefits. One of the key characteristics of these applications is the wide range of strategies that an adversary may choose as they adapt their strategy dynamically to sustain benefits and evade authorities. In this paper, we present a novel way of approaching these types of applications, in particular in the context of Anti-Money Laundering. We provide a mechanism through which diverse, realistic and new unobserved behavior may be generated to discover potential unobserved adversarial actions to enable organizations to preemptively mitigate these risks. In this regard, we make three main contributions. (a) Propose a novel behavior-based model as opposed to individual transactions-based models currently used by financial institutions. We introduce behavior traces as enriched relational representation to represent observed human behavior. (b) A modelling approach that observes these traces and is able to accurately infer the goals of actors by classifying the behavior into money laundering or standard behavior despite significant unobserved activity. And (c) a synthetic behavior simulator that can generate new previously unseen traces. The simulator incorporates a high level of flexibility in the behavioral parameters so that we can challenge the detection algorithm. Finally, we provide experimental results that show that the learning module (automated investigator) that has only partial observability can still successfully infer the type of behavior, and thus the simulated goals, followed by customers based on traces - a key aspiration for many applications today., A version appeared in the Proceedings of the 2020 ACM International Conference on AI in Finance (ICAIF'20)
- Published
- 2020
3. An Extensible Event Extraction System With Cross-Media Event Resolution
- Author
-
Natraj Raman, Sameena Shah, Jochen L. Leidner, Žarko Panić, Fabio Petroni, Armineh Nourbakhsh, and Timothy Nugent
- Subjects
Focus (computing) ,Decision support system ,Event (computing) ,Computer science ,02 engineering and technology ,computer.software_genre ,Data science ,Information extraction ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Unavailability ,Natural disaster ,computer ,Natural language - Abstract
The automatic extraction of breaking news events from natural language text is a valuable capability for decision support systems. Traditional systems tend to focus on extracting events from a single media source and often ignore cross-media references. Here, we describe a large-scale automated system for extracting natural disasters and critical events from both newswire text and social media. We outline a comprehensive architecture that can identify, categorize and summarize seven different event types - namely floods, storms, fires, armed conflict, terrorism, infrastructure breakdown, and labour unavailability. The system comprises fourteen modules and is equipped with a novel coreference mechanism, capable of linking events extracted from the two complementary data sources. Additionally, the system is easily extensible to accommodate new event types. Our experimental evaluation demonstrates the effectiveness of the system.
- Published
- 2018
4. Reuters Tracer
- Author
-
Kajsa Anderson, Armineh Nourbakhsh, Xiaomo Liu, Arun Vachher, Rui Fang, Steven Pomerville, Ramdev Wudali, Russ Kociuba, Quanzhi Li, Mark Vedder, William M. Keenan, Merine Thomas, John Duprey, Sameena Shah, and Robert Martin
- Subjects
Computer science ,Event (computing) ,InformationSystems_INFORMATIONSTORAGEANDRETRIEVAL ,02 engineering and technology ,World Wide Web ,020204 information systems ,Scale (social sciences) ,Agency (sociology) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Social media ,Journalism ,Noise (video) ,News media - Abstract
News professionals are facing the challenge of discovering news from more diverse and unreliable information in the age of social media. More and more news events break on social media first and are picked up by news media subsequently. The recent Brussels attack is such an example. At Reuters, a global news agency, we have observed the necessity of providing a more effective tool that can help our journalists to quickly discover news on social media, verify them and then inform the public. In this paper, we describe Reuters Tracer, a system for sifting through all noise to detect news events on Twitter and assessing their veracity. We disclose the architecture of our system and discuss the various design strategies that facilitate the implementation of machine learning models for noise filtering and event detection. These techniques have been implemented at large scale and successfully discovered breaking news faster than traditional journalism
- Published
- 2016
5. TweetSift
- Author
-
Armineh Nourbakhsh, Quanzhi Li, Rui Fang, Xiaomo Liu, and Sameena Shah
- Subjects
Information retrieval ,Word embedding ,Event (computing) ,Computer science ,business.industry ,Context (language use) ,02 engineering and technology ,Metadata ,Knowledge base ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Social media ,InformationSystems_MISCELLANEOUS ,business ,Classifier (UML) ,Word (computer architecture) - Abstract
Classifying tweets into topic categories is necessary and important for many applications, since tweets are about a variety of topics and users are only interested in certain topical areas. Many tweet classification approaches fail to achieve high accuracy due to data sparseness issue. Tweet, as a special type of short text, in additional to its text, also has other metadata that can be used to enrich its context, such as user name, mention, hashtag and embedded link. In this demonstration, we present TweetSift, an efficient and effective real time tweet topic classifier. TweetSift exploits external tweet-specific entity knowledge to provide more topical context for a tweet, and integrates them with topic enhanced word embeddings for topic classification. The demonstration will show how TweetSift works and how it is incorporated with our social media event detection system.
- Published
- 2016
6. Hashtag Recommendation Based on Topic Enhanced Embedding, Tweet Entity Data and Learning to Rank
- Author
-
Armineh Nourbakhsh, Rui Fang, Xiaomo Liu, Quanzhi Li, and Sameena Shah
- Subjects
Information retrieval ,Word embedding ,Computer science ,InformationSystems_INFORMATIONSTORAGEANDRETRIEVAL ,05 social sciences ,02 engineering and technology ,Temporal database ,Domain (software engineering) ,0202 electrical engineering, electronic engineering, information engineering ,Embedding ,020201 artificial intelligence & image processing ,Social media ,Learning to rank ,0509 other social sciences ,050904 information & library sciences ,Word (computer architecture) - Abstract
In this paper, we present a new approach of recommending hashtags for tweets. It uses Learning to Rank algorithm to incorporate features built from topic enhanced word embeddings, tweet entity data, hashtag frequency, hashtag temporal data and tweet URL domain information. The experiments using millions of tweets and hashtags show that the proposed approach outperforms the three baseline methods -- the LDA topic, the tf.idf based and the general word embedding approaches.
- Published
- 2016
7. Real-time Rumor Debunking on Twitter
- Author
-
Sameena Shah, Quanzhi Li, Xiaomo Liu, Rui Fang, and Armineh Nourbakhsh
- Subjects
World Wide Web ,Identification (information) ,Social computing ,Crowds ,Microblogging ,Computer science ,business.industry ,Event (computing) ,TheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITY ,Internet privacy ,Social media ,Rumor ,business - Abstract
In this paper, we propose the first real time rumor debunking algorithm for Twitter. We use cues from 'wisdom of the crowds', that is, the aggregate 'common sense' and investigative journalism of Twitter users. We concentrate on identification of a rumor as an event that may comprise of one or more conflicting microblogs. We continue monitoring the rumor event and generate real time updates dynamically based on any additional information received. We show using real streaming data that it is possible, using our approach, to debunk rumors accurately and efficiently, often much faster than manual verification by professionals.
- Published
- 2015
8. Fast object detection using local feature-based SVMs
- Author
-
Subhajit Sanyal, Sameena Shah, and S. H. Srinivasan
- Subjects
business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Scale-invariant feature transform ,Pattern recognition ,Object (computer science) ,Object detection ,Support vector machine ,Object-class detection ,Feature (computer vision) ,Clutter ,Computer vision ,Viola–Jones object detection framework ,Artificial intelligence ,business - Abstract
Viola-Jones approach to object detection is by far the most widely used object detection technique because of speed of detection in images with clutter. SVM-based object detection techniques have the disadvantage of slow detection speeds because of exhaustive window search. Appearance-based detection techniques do not generalize well in the presence of pose variations. In this paper, we propose a feature-based technique which classifies salient-points as belonging to object or background classes and performs object detection based on classified key points. Since keypoints are sparse, the technique is very fast. The use of SIFT descriptor provides invariance to scale and pose changes.
- Published
- 2007
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.