{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:08:16Z","timestamp":1755907696263,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T00:00:00Z","timestamp":1731542400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,14]]},"DOI":"10.1145\/3677052.3698678","type":"proceedings-article","created":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T06:38:06Z","timestamp":1731566286000},"page":"27-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Reducing Return Volatility in Neural Network-Based Asset Allocation via Formal Verification and Certified Training"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-2368-0430","authenticated-orcid":false,"given":"Edward","family":"Stevinson","sequence":"first","affiliation":[{"name":"Imperial College London, United Kingdom and Safe Intelligence, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3420-723X","authenticated-orcid":false,"given":"Alessio","family":"Lomuscio","sequence":"additional","affiliation":[{"name":"Safe Intelligence, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2024,11,14]]},"reference":[{"volume-title":"Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1.","author":"Andriushchenko M.","key":"e_1_3_2_1_1_1","unstructured":"F.\u00a0M. Andriushchenko, V. Sehwag, E. Debenedetti, N. Flammarion, M. Chiang, P. Mittal, and M. Hein. 2021. RobustBench: a standardized adversarial robustness benchmark. In Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1."},{"key":"e_1_3_2_1_2_1","unstructured":"S. Bai Z. Kolter and V. Koltun. 2018. An Empirical Evaluation of Generic Convolutional and Recurrent Networks for Sequence Modeling. CoRR (2018)."},{"key":"e_1_3_2_1_3_1","unstructured":"M. Balunovic M. Baader G. Singh T. Gehr and M. Vechev. 2019. Certifying Geometric Robustness of Neural Networks. In Advances in Neural Information Processing Systems (NeurIPS19). Curran Associates Inc. 15313\u201315323."},{"key":"e_1_3_2_1_4_1","unstructured":"O. Bastani Y. Ioannou L. Lampropoulos D. Vytiniotis A. Nori and A. Criminisi. 2016. Measuring Neural Net Robustness with Constraints. CoRR (2016)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.13543"},{"key":"e_1_3_2_1_6_1","volume-title":"Global Portfolio Optimization. (Sep","author":"Black Fischer","year":"1992","unstructured":"Fischer Black and Robert\u00a0B. Litterman. 1992. Global Portfolio Optimization. (Sep 1992)."},{"key":"e_1_3_2_1_7_1","volume-title":"Verification Property: A Principled Case Study. In Computer Aided Verification - 34th International Conference, Vol.\u00a013371","author":"Casadio M.","year":"2022","unstructured":"M. Casadio, E. Komendantskaya, M. Daggitt, W. Kokke, G. Katz, G. Amir, and I. Refaeli. 2022. Neural Network Robustness as a Verification Property: A Principled Case Study. In Computer Aided Verification - 34th International Conference, Vol.\u00a013371. Springer, 219\u2013231."},{"volume-title":"In Proceedings of the 36th International Conference on Machine Learning.","author":"Cohen J.","key":"e_1_3_2_1_8_1","unstructured":"J. Cohen, E. Rosenfeld, and J. Kolter. 2019. Certified Adversarial Robustness via Randomized Smoothing. In In Proceedings of the 36th International Conference on Machine Learning."},{"key":"e_1_3_2_1_9_1","unstructured":"H. David J. Borwein M.\u00a0L\u00f3pez de Prado and Q. Zhu. 2015. The Probability of Backtest Overfitting. In Journal of Computational Finance."},{"key":"e_1_3_2_1_10_1","unstructured":"V. DeMiguel L. Garlappi and R. Uppal. 2009. Optimal versus naive diversification: How inefficient is the 1\/N portfolio strategy?. In The review of Financial studies."},{"key":"e_1_3_2_1_11_1","unstructured":"Logan Engstrom Brandon Tran Dimitris Tsipras Ludwig Schmidt and Aleksander Madry. 2019. Exploring the Landscape of Spatial Robustness."},{"volume-title":"Robust Physical-World Attacks on Deep Learning Visual Classification. In 2018 IEEE Conference on Computer Vision and Pattern Recognition. 1625\u20131634","author":"Eykholt K.","key":"e_1_3_2_1_12_1","unstructured":"K. Eykholt, I. Evtimov, E. Fernandes, B. Li, A. Rahmati, C. Xiao, A. Prakash, T. Kohno, and D. Song. 2018. Robust Physical-World Attacks on Deep Learning Visual Classification. In 2018 IEEE Conference on Computer Vision and Pattern Recognition. 1625\u20131634."},{"volume-title":"Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence. ijcai.org, 5843\u20135849","author":"Feng F.","key":"e_1_3_2_1_13_1","unstructured":"F. Feng, H. Chen, X. He, J. Ding, M. Sun, and T. Chua. 2019. Enhancing Stock Movement Prediction with Adversarial Training. In Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence. ijcai.org, 5843\u20135849."},{"volume-title":"The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. ACM, 2868\u20132878","author":"Fursov I.","key":"e_1_3_2_1_14_1","unstructured":"I. Fursov, M. Morozov, N. Kaploukhaya, E. Kovtun, R. Rivera-Castro, G. Gusev, D. Babaev, I. Kireev, A. Zaytsev, and E. Burnaev. 2021. Adversarial Attacks on Deep Models for Financial Transaction Records. In KDD \u201921: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. ACM, 2868\u20132878."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Gary\u00a0L Gastineau. 2008. Exchange-traded funds. Vol.\u00a0Handbook of finance.","DOI":"10.1002\/9780470404324.hof001065"},{"key":"e_1_3_2_1_16_1","unstructured":"I. Goodfellow Y. Bengio and A. Courville. 2016. Deep Learning. MIT Press Cambridge MA USA. http:\/\/www.deeplearningbook.org."},{"key":"e_1_3_2_1_17_1","unstructured":"I. Goodfellow J. Shlens and C. Szegedy. 2014. Explaining and harnessing adversarial examples. (2014)."},{"volume-title":"Explaining and Harnessing Adversarial Examples. In 3rd International Conference on Learning Representations.","author":"Goodfellow I.","key":"e_1_3_2_1_18_1","unstructured":"I. Goodfellow, J. Shlens, and C. Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In 3rd International Conference on Learning Representations."},{"key":"e_1_3_2_1_19_1","unstructured":"S. Gowal K. Dvijotham R. Stanforth R. Bunel C. Qin J. Uesato R. Arandjelovic T. Mann and P. Kohli. 2018. On the Effectiveness of Interval Bound Propagation for Training Verifiably Robust Models. CoRR (2018)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"P Henriksen K Hammernik D Rueckert and A Lomuscio. 2021. Bias Field Robustness Verification of Large Neural Image Classifiers.","DOI":"10.5244\/C.35.356"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.3233\/FAIA200385"},{"volume-title":"Proceedings of the 24th European Conference on Artificial Intelligence (ECAI20)","author":"Henriksen P.","key":"e_1_3_2_1_22_1","unstructured":"P. Henriksen and A. Lomuscio. 2020. Efficient Neural Network Verification via Adaptive Refinement and Adversarial Search. In Proceedings of the 24th European Conference on Artificial Intelligence (ECAI20). IOS Press, 2513\u20132520."},{"key":"e_1_3_2_1_23_1","unstructured":"P Henriksen and A Lomuscio. 2022. Robust training of neural networks against bias field perturbations. AAAI. http:\/\/hdl.handle.net\/10044\/1\/102183"},{"volume-title":"Proceedings of the 30th International Joint Conference on Artificial Intelligence (IJCAI21)","author":"Kouvaros P.","key":"e_1_3_2_1_24_1","unstructured":"P. Kouvaros and A. Lomuscio. 2021. Towards Scalable Complete Verification of ReLU Neural Networks via Dependency-based Branching. In Proceedings of the 30th International Joint Conference on Artificial Intelligence (IJCAI21). ijcai.org, 2643\u20132650."},{"key":"e_1_3_2_1_25_1","volume-title":"Forty-first International Conference on Machine Learning, ICML 2024","author":"Li L.","year":"2024","unstructured":"L. Li, Y. Wang, C. Sitawarin, and M. Spratling. 2024. OODRobustBench: a Benchmark and Large-Scale Analysis of Adversarial Robustness under Distribution Shift. In Forty-first International Conference on Machine Learning, ICML 2024, Vienna, Austria, July 21-27, 2024."},{"volume-title":"Robust Multivariate Time-Series Forecasting: Adversarial Attacks and Defense Mechanisms. In The Eleventh International Conference on Learning Representations, ICLR. OpenReview.net.","author":"Liu L.","key":"e_1_3_2_1_26_1","unstructured":"L. Liu, Y. Park, T. Hoang, H. Hasson, and L. Huan. 2023. Robust Multivariate Time-Series Forecasting: Adversarial Attacks and Defense Mechanisms. In The Eleventh International Conference on Learning Representations, ICLR. OpenReview.net."},{"key":"e_1_3_2_1_27_1","unstructured":"M Lopez\u00a0de Prado. 2018. (7th ed.). John Wiley & Sons."},{"key":"e_1_3_2_1_28_1","unstructured":"A. Madry A. Makelov L. Schmidt D. Tsipras and A. Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. (2018)."},{"key":"e_1_3_2_1_29_1","volume-title":"The Journal of Finance 7","author":"Markowitz H.","year":"1952","unstructured":"H. Markowitz. 1952. Portfolio Selection. The Journal of Finance 7 (1952)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1093\/rfs\/14.3.901"},{"key":"e_1_3_2_1_31_1","unstructured":"A.\u00a0De Palma R. Bunel A. Desmaison K. Dvijotham P. Kohli P. Torr and P. Kumar. 2021. Improved Branch and Bound for Neural Network Verification via Lagrangian Decomposition. ArXiv abs\/2104.06718 (2021)."},{"volume-title":"Proceedings of the Fourth ACM International Conference on AI in Finance(ICAIF \u201923)","author":"Pandey A.","key":"e_1_3_2_1_32_1","unstructured":"A. Pandey, H. Chaudhary, A. Bhatraju, D. Bhatt, and M. Singh. 2023. Improving the Robustness of Financial Models through Identification of the Minimal Vulnerable Feature Set. In Proceedings of the Fourth ACM International Conference on AI in Finance(ICAIF \u201923). Association for Computing Machinery, 297\u2013304."},{"key":"e_1_3_2_1_33_1","unstructured":"R. Pardo. 1992. Design Testing and Optimization of Trading Systems. (1992)."},{"key":"e_1_3_2_1_34_1","unstructured":"Q. Pham C. Liu D. Sahoo and S. Hoi. 2023. Learning Fast and Slow for Online Time Series Forecasting. In The Eleventh International Conference on Learning Representations ICLR. OpenReview.net."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"E. Praboda and T. Silva. 2019. Fuzzy Logic Based Backtesting System. In Artificial Intelligence. Springer Singapore Singapore 15\u201331.","DOI":"10.1007\/978-981-13-9129-3_2"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1080\/14697681003685597"},{"volume-title":"Proceedings of the Fourth ACM International Conference on AI in Finance(ICAIF \u201923)","author":"Ramirez D.","key":"e_1_3_2_1_37_1","unstructured":"D. Ramirez, J-M.\u00a0Pe na, F. Su\u00e1rez, O. Larr\u00e9, and A. Cifuentes. 2023. A Machine Learning Plus-Features Based Approach for Optimal Asset Allocation. In Proceedings of the Fourth ACM International Conference on AI in Finance(ICAIF \u201923). Association for Computing Machinery, 549\u2013556."},{"key":"e_1_3_2_1_38_1","volume-title":"The sharpe ratio. The Journal of Portfolio Management 21(1)","author":"Sharpe W.","year":"1994","unstructured":"W. Sharpe. 1994. The sharpe ratio. The Journal of Portfolio Management 21(1) (1994), 49\u201358."},{"key":"e_1_3_2_1_39_1","unstructured":"Z. Shi H. Zhang K-W. Chang M. Huang and C-J. Hsieh. 2020. Robustness Verification for Transformers."},{"key":"e_1_3_2_1_40_1","first-page":"15072","article-title":"Beyond the Single Neuron Convex Barrier for Neural Network Certification","author":"Singh G.","year":"2019","unstructured":"G. Singh, R. Ganvir, M. P\u00fcschel, and M. Vechev. 2019. Beyond the Single Neuron Convex Barrier for Neural Network Certification. In Advances in Neural Information Processing Systems 32, NeurIPS. 15072\u201315083.","journal-title":"Advances in Neural Information Processing Systems 32, NeurIPS."},{"key":"e_1_3_2_1_41_1","volume-title":"2nd International Conference on Learning Representations, ICLR","author":"Szegedy C.","year":"2014","unstructured":"C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus. 2014. Intriguing properties of neural networks. In 2nd International Conference on Learning Representations, ICLR 2014."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.14793\/ccrd_report_05"},{"key":"e_1_3_2_1_43_1","volume-title":"7th International Conference on Learning Representations, ICLR","author":"Tsipras D.","year":"2019","unstructured":"D. Tsipras, S. Santurkar, L. Engstrom, A. Turner, and A. Madry. 2019. Robustness May Be at Odds with Accuracy. In 7th International Conference on Learning Representations, ICLR 2019."},{"key":"e_1_3_2_1_44_1","unstructured":"J. Wang X. Hu W. Hou H. Chen R. Zheng Y. Wang L. Yang H. Huang W. Ye X. Geng B. Jiao Y. Zhang and Xing Xie. 2023. On the Robustness of ChatGPT: An Adversarial and Out-of-distribution Perspective."},{"key":"e_1_3_2_1_45_1","unstructured":"S. Wang K. Pei J. Whitehouse J. Yang and S. Jana. 2018. Efficient Formal Safety Analysis of Neural Networks. In Advances in Neural Information Processing Systems (NeurIPS18). Curran Associates Inc. 6367\u20136377."},{"volume-title":"Proceedings of the 27th USENIX Security Symposium (USENIX18)","author":"Wang S.","key":"e_1_3_2_1_46_1","unstructured":"S. Wang, K. Pei, J. Whitehouse, J. Yang, and S. Jana. 2018. Formal Security Analysis of Neural Networks using Symbolic Intervals. In Proceedings of the 27th USENIX Security Symposium (USENIX18)."},{"key":"e_1_3_2_1_47_1","volume-title":"Beta-crown: Efficient bound propagation with per-neuron split constraints for complete and incomplete neural network verification.","author":"Wang S.","year":"2021","unstructured":"S. Wang, H. Zhang, K. Xu, X. Lin, S. Jana, C. Hsieh, and J. Kolter. 2021. Beta-crown: Efficient bound propagation with per-neuron split constraints for complete and incomplete neural network verification. (2021)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Y. Wang Y. Yang D. He and K. He. 2023. Robustness-Aware Word Embedding Improves Certified Robustness to Adversarial Word Substitutions. In Findings of the Association for Computational Linguistics. 673\u2013687.","DOI":"10.18653\/v1\/2023.findings-acl.42"},{"key":"e_1_3_2_1_49_1","first-page":"2640","volume-title":"Proceedings of The 26th International Conference on Artificial Intelligence and Statistics (2023-04-11)","author":"Wei D.","unstructured":"D. Wei, H. Wu, M. Wu, P-Y. Chen, C. Barrett, and E. Farchi. [n. d.]. Convex Bounds on the Softmax Function with Applications to Robustness Verification. In Proceedings of The 26th International Conference on Artificial Intelligence and Statistics (2023-04-11). PMLR, 6853\u20136878. ISSN: 2640-3498."},{"key":"e_1_3_2_1_50_1","unstructured":"K. Yashaswi. 2021. Deep Reinforcement Learning for Portfolio Optimization using Latent Feature State Space (LFSS) Module."},{"volume-title":"Proceedings of the 37th International Conference on Machine Learning, Vol.\u00a0119","author":"Zhang J.","key":"e_1_3_2_1_51_1","unstructured":"J. Zhang, X. Xu, B. Han, G. Niu, L. Cui, M. Sugiyama, and M. Kankanhalli. 2020. Attacks Which Do Not Kill Training Make Adversarial Learning Stronger. In Proceedings of the 37th International Conference on Machine Learning, Vol.\u00a0119."},{"key":"e_1_3_2_1_52_1","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","author":"Zhang Y.","year":"2024","unstructured":"Y. Zhang, L. Shen, S. Guo, and S. Ji. 2024. GaLileo: General Linear Relaxation Framework for Tightening Robustness Certification of Transformers. Proceedings of the AAAI Conference on Artificial Intelligence (2024)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"crossref","unstructured":"Z. Zhang S. Zohren and S. Roberts. 2020. Deep Learning for Portfolio Optimisation. CoRR abs\/2005.13665 (2020).","DOI":"10.2139\/ssrn.3613600"}],"event":{"name":"ICAIF '24: 5th ACM International Conference on AI in Finance","acronym":"ICAIF '24","location":"Brooklyn NY USA"},"container-title":["Proceedings of the 5th ACM International Conference on AI in Finance"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3677052.3698678","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3677052.3698678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:10:04Z","timestamp":1755882604000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3677052.3698678"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,14]]},"references-count":53,"alternative-id":["10.1145\/3677052.3698678","10.1145\/3677052"],"URL":"https:\/\/doi.org\/10.1145\/3677052.3698678","relation":{},"subject":[],"published":{"date-parts":[[2024,11,14]]},"assertion":[{"value":"2024-11-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}