Datasets:
Add Dark Pool sample (10K fraud/AML sequences) with README, SCHEMA, parquet, JSONL
Browse files- .gitattributes +1 -0
- README.md +163 -0
- SCHEMA.md +107 -0
- dark_pool_sample.jsonl +3 -0
- dark_pool_sample.parquet +3 -0
.gitattributes
CHANGED
|
@@ -58,3 +58,4 @@ saved_model/**/* filter=lfs diff=lfs merge=lfs -text
|
|
| 58 |
# Video files - compressed
|
| 59 |
*.mp4 filter=lfs diff=lfs merge=lfs -text
|
| 60 |
*.webm filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
| 58 |
# Video files - compressed
|
| 59 |
*.mp4 filter=lfs diff=lfs merge=lfs -text
|
| 60 |
*.webm filter=lfs diff=lfs merge=lfs -text
|
| 61 |
+
dark_pool_sample.jsonl filter=lfs diff=lfs merge=lfs -text
|
README.md
ADDED
|
@@ -0,0 +1,163 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
---
|
| 2 |
+
license: cc-by-4.0
|
| 3 |
+
task_categories:
|
| 4 |
+
- tabular-classification
|
| 5 |
+
- tabular-regression
|
| 6 |
+
- time-series-forecasting
|
| 7 |
+
language:
|
| 8 |
+
- en
|
| 9 |
+
tags:
|
| 10 |
+
- synthetic
|
| 11 |
+
- finance
|
| 12 |
+
- fraud-detection
|
| 13 |
+
- aml
|
| 14 |
+
- anti-money-laundering
|
| 15 |
+
- anomaly-detection
|
| 16 |
+
- transaction-monitoring
|
| 17 |
+
- fintech
|
| 18 |
+
- banking
|
| 19 |
+
- crypto
|
| 20 |
+
- market-manipulation
|
| 21 |
+
- account-takeover
|
| 22 |
+
- false-positive-reduction
|
| 23 |
+
pretty_name: Aestrea Dark Pool Financial Anomaly Pack
|
| 24 |
+
size_categories:
|
| 25 |
+
- 10K<n<100K
|
| 26 |
+
configs:
|
| 27 |
+
- config_name: default
|
| 28 |
+
data_files:
|
| 29 |
+
- split: train
|
| 30 |
+
path: dark_pool_sample.parquet
|
| 31 |
+
---
|
| 32 |
+
|
| 33 |
+
# Aestrea Dark Pool Financial Anomaly Pack (Sample)
|
| 34 |
+
|
| 35 |
+
**A synthetic financial-anomaly and fraud-detection dataset for AML / transaction-monitoring model training, false-positive reduction research, and fintech anomaly-detection pipelines.** Each row is a complete financial activity sequence — a dormant warm-up period followed by a sudden activity burst — labeled as account takeover, market-manipulation spoofing, or legitimate-but-high-risk (false positive) behavior, with telemetry, identity context, detection logic, and financial exposure.
|
| 36 |
+
|
| 37 |
+
Built by [SolsticeAI](https://www.solsticestudio.ai/datasets) as a free sample of a larger commercial pack. 100% synthetic. No real transactions, accounts, addresses, order books, or customer data.
|
| 38 |
+
|
| 39 |
+
## What is included
|
| 40 |
+
|
| 41 |
+
| File | Rows | Format | Purpose |
|
| 42 |
+
|---|---:|---|---|
|
| 43 |
+
| `dark_pool_sample.parquet` | 10,000 | Parquet | Columnar, typed, best for analytics |
|
| 44 |
+
| `dark_pool_sample.jsonl` | 10,000 | JSON Lines | Streaming / LLM training friendly |
|
| 45 |
+
|
| 46 |
+
**This sample:** 10,000 financial activity sequences, stratified 3,333 per fraud class.
|
| 47 |
+
**Fraud classes (3):** `Account_Takeover_Sequence`, `Market_Manipulation_Spoofing`, `Legitimate_High_Risk_Activity` (false positive)
|
| 48 |
+
**Label distribution:** ~6,666 `fraudulent` / ~3,334 `benign` (by design — one of three scenarios is a benign high-risk lookalike)
|
| 49 |
+
**Severity tiers:** `low`, `medium`, `high`, `critical` — scenario-weighted so spoofing skews mid, ATO skews high, false-positives skew low
|
| 50 |
+
**Assets covered:** BTC, ETH, USDC, USDT, SOL, USD, EUR, GBP, JPY
|
| 51 |
+
**Geographic coverage:** 20 country codes across high-risk and low-risk jurisdictions
|
| 52 |
+
|
| 53 |
+
## Record structure
|
| 54 |
+
|
| 55 |
+
Each record is one financial activity sequence with 7 top-level fields:
|
| 56 |
+
|
| 57 |
+
| Field | Type | Contents |
|
| 58 |
+
|---|---|---|
|
| 59 |
+
| `schema_version` | string | Pack schema version (`1.0.0-dark-pool-sample`) |
|
| 60 |
+
| `event` | struct | `id`, `trace_id`, `timestamp`, `severity`, `label`, `label_confidence` |
|
| 61 |
+
| `identity_context` | struct | `account_id`, `baseline_risk_score`, `session_entropy`, `account_age_days`, `kyc_tier` |
|
| 62 |
+
| `telemetry_stream` | list<struct> | Ordered financial events: `timestamp`, `event_name` (e.g., `LARGE_WITHDRAWAL`, `LIMIT_ORDER_CANCELLED`, `LOGIN_NEW_COUNTRY`), `asset`, `transaction_amount_usd`, `geo_country`, `latency_ms`, `burst_indicator` |
|
| 63 |
+
| `vulnerability` | struct | `fraud_class`, `scenario_description`, `exposure_vector` |
|
| 64 |
+
| `detection` | struct | `anomaly_type`, `baseline_deviation`, `detection_logic` (SQL-like), `anomaly_score`, `confidence_band` |
|
| 65 |
+
| `impact` | struct | `financial_exposure_usd`, `customer_funds_at_risk_usd`, `recoverable_pct` |
|
| 66 |
+
| `simulation` | struct | `synthetic`, `engine`, `chaos_profile`, `ground_truth_classification` |
|
| 67 |
+
|
| 68 |
+
See [SCHEMA.md](./SCHEMA.md) for the full nested field breakdown.
|
| 69 |
+
|
| 70 |
+
## Why this dataset is useful
|
| 71 |
+
|
| 72 |
+
Most public financial-fraud datasets are either flat tabular snapshots (IEEE-CIS, credit-card fraud) or narrow single-event labels. Real AML / transaction-monitoring models need something these don't provide: **sequences** (warm-up → burst), **ambiguous labels** (legitimate-but-high-risk that looks like fraud), and **detection logic grounded in behavioral patterns** rather than just feature engineering.
|
| 73 |
+
|
| 74 |
+
- Full pre-event dormant and check-in telemetry — not just the burst
|
| 75 |
+
- `burst_indicator` flags at each step so models can learn temporal dynamics explicitly
|
| 76 |
+
- A dedicated false-positive class (`Legitimate_High_Risk_Activity`) with benign ground truth but fraud-adjacent behavior — the exact class that drives real-world FP rates
|
| 77 |
+
- Per-record `detection_logic` in SQL-like form shows how the scenario would be detected in production
|
| 78 |
+
- Per-record `anomaly_score` and `label_confidence` so models can train on calibration targets, not just hard labels
|
| 79 |
+
- Cross-asset (crypto + fiat), cross-geography coverage
|
| 80 |
+
|
| 81 |
+
## Typical use cases
|
| 82 |
+
|
| 83 |
+
- Fraud-detection model training
|
| 84 |
+
- AML / transaction-monitoring pipelines
|
| 85 |
+
- False-positive-reduction research (reducing customer-experience pain)
|
| 86 |
+
- Risk-scoring systems
|
| 87 |
+
- Account-takeover detection
|
| 88 |
+
- Spoofing / market-manipulation classifiers
|
| 89 |
+
- Temporal-burst anomaly detection
|
| 90 |
+
- LLM fine-tuning on fraud-investigation narratives
|
| 91 |
+
- Benchmarking anomaly scoring against ambiguous ground truth
|
| 92 |
+
|
| 93 |
+
## Quick start
|
| 94 |
+
|
| 95 |
+
```python
|
| 96 |
+
import pandas as pd
|
| 97 |
+
import pyarrow.parquet as pq
|
| 98 |
+
|
| 99 |
+
df = pq.read_table("dark_pool_sample.parquet").to_pandas()
|
| 100 |
+
|
| 101 |
+
# Label distribution (mix of fraudulent and benign)
|
| 102 |
+
print(df["event"].apply(lambda e: e["label"]).value_counts())
|
| 103 |
+
|
| 104 |
+
# Average financial exposure by fraud class
|
| 105 |
+
df["cls"] = df["vulnerability"].apply(lambda v: v["fraud_class"])
|
| 106 |
+
df["exposure"] = df["impact"].apply(lambda i: i["financial_exposure_usd"])
|
| 107 |
+
print(df.groupby("cls")["exposure"].mean().round(0))
|
| 108 |
+
|
| 109 |
+
# Burst density by scenario (bursts per sequence)
|
| 110 |
+
df["burst_count"] = df["telemetry_stream"].apply(
|
| 111 |
+
lambda s: sum(1 for step in s if step["burst_indicator"])
|
| 112 |
+
)
|
| 113 |
+
print(df.groupby("cls")["burst_count"].mean().round(2))
|
| 114 |
+
|
| 115 |
+
# False-positive rate signal — proportion of fraudulent-label vs benign per severity
|
| 116 |
+
df["severity"] = df["event"].apply(lambda e: e["severity"])
|
| 117 |
+
df["label"] = df["event"].apply(lambda e: e["label"])
|
| 118 |
+
print(pd.crosstab(df["severity"], df["label"], normalize="index").round(3))
|
| 119 |
+
```
|
| 120 |
+
|
| 121 |
+
Streaming form:
|
| 122 |
+
|
| 123 |
+
```python
|
| 124 |
+
import json
|
| 125 |
+
|
| 126 |
+
with open("dark_pool_sample.jsonl") as f:
|
| 127 |
+
for line in f:
|
| 128 |
+
sequence = json.loads(line)
|
| 129 |
+
# one financial activity sequence per line
|
| 130 |
+
```
|
| 131 |
+
|
| 132 |
+
## Responsible use
|
| 133 |
+
|
| 134 |
+
This dataset is intended for **defensive / monitoring** use cases: fraud-detection model training, AML research, false-positive reduction, and academic benchmarks. It contains synthesized transaction amounts, synthetic account IDs, and fictional scenario narratives — it does **not** contain real customer data, real transactions, real wallet addresses, or any PII. Models trained on this data will learn fraud-pattern shape and temporal dynamics; downstream deployment for live transaction monitoring requires calibration against institution-specific real-world data under appropriate compliance review.
|
| 135 |
+
|
| 136 |
+
## License
|
| 137 |
+
|
| 138 |
+
Released under **CC BY 4.0**. Use freely for research, fraud-tool prototyping, education, and commercial development with attribution.
|
| 139 |
+
|
| 140 |
+
## Get the full pack
|
| 141 |
+
|
| 142 |
+
This Hugging Face repo is a **10K-sequence sample**. The production pack scales to 5M+ sequences with expanded scenario coverage (layering, smurfing, wash trading, sanctions-evasion routing, trade-based ML, bust-out fraud), additional asset classes (equities, FX, derivatives, NFTs), multi-entity transaction graphs, richer ambiguous-label distribution tuning, parquet + JSONL + SAR-narrative-aligned delivery, and buyer-specific variants.
|
| 143 |
+
|
| 144 |
+
**Self-serve (Stripe checkout):**
|
| 145 |
+
- [**Sample Scale tier — $5,000**](https://buy.stripe.com/7sY5kD2j85QTfSb5lfeEo03) — ~25K records, one subject, 72-hour delivery.
|
| 146 |
+
|
| 147 |
+
**Full pack + enterprise scope:**
|
| 148 |
+
- [www.solsticestudio.ai/datasets](https://www.solsticestudio.ai/datasets) — per-SKU pricing across Starter / Professional / Enterprise tiers, plus commercial licensing, custom generation, and buyer-specific variants.
|
| 149 |
+
|
| 150 |
+
**Procurement catalog:**
|
| 151 |
+
- [SolsticeAI Data Storefront](https://solsticeai.mydatastorefront.com) — available via Datarade / Monda.
|
| 152 |
+
|
| 153 |
+
## Citation
|
| 154 |
+
|
| 155 |
+
```bibtex
|
| 156 |
+
@dataset{solstice_dark_pool_pack_2026,
|
| 157 |
+
title = {Aestrea Dark Pool Financial Anomaly Pack (Sample)},
|
| 158 |
+
author = {SolsticeAI},
|
| 159 |
+
year = {2026},
|
| 160 |
+
publisher = {Hugging Face},
|
| 161 |
+
url = {https://huggingface.co/datasets/solsticestudioai/dark-pool-pack}
|
| 162 |
+
}
|
| 163 |
+
```
|
SCHEMA.md
ADDED
|
@@ -0,0 +1,107 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Aestrea Dark Pool Financial Anomaly Pack — Schema
|
| 2 |
+
|
| 3 |
+
One row = one financial activity sequence (warm-up → burst). All records share the same seven top-level fields.
|
| 4 |
+
|
| 5 |
+
Schema version: `1.0.0-dark-pool-sample`
|
| 6 |
+
|
| 7 |
+
## Top-level fields
|
| 8 |
+
|
| 9 |
+
### `schema_version` — string
|
| 10 |
+
Schema identifier. Constant within a sample release.
|
| 11 |
+
|
| 12 |
+
### `event` — struct
|
| 13 |
+
Identifier fields and the overall label/severity for the sequence.
|
| 14 |
+
|
| 15 |
+
| Field | Type | Notes |
|
| 16 |
+
|---|---|---|
|
| 17 |
+
| `id` | string | Stable event identifier, e.g., `DARKPOOL-100000`. |
|
| 18 |
+
| `trace_id` | string (UUID) | Cross-links telemetry within the sequence. |
|
| 19 |
+
| `timestamp` | string (ISO-8601) | Sequence anchor time (burst start). |
|
| 20 |
+
| `severity` | string | `low`, `medium`, `high`, `critical`. |
|
| 21 |
+
| `label` | string | `fraudulent` or `benign`. |
|
| 22 |
+
| `label_confidence` | double | 0–1. Lower on ambiguous scenarios (false-positive class skews lower). |
|
| 23 |
+
|
| 24 |
+
### `identity_context` — struct
|
| 25 |
+
Synthetic account-level context.
|
| 26 |
+
|
| 27 |
+
| Field | Type | Notes |
|
| 28 |
+
|---|---|---|
|
| 29 |
+
| `account_id` | string | Synthetic account identifier (e.g., `ACCT-A1B2C3D4E5F6`). |
|
| 30 |
+
| `baseline_risk_score` | double | 0–1. Pre-sequence risk signal. |
|
| 31 |
+
| `session_entropy` | double | 0–1. Unpredictability of session behavior. |
|
| 32 |
+
| `account_age_days` | int | Account age (days). |
|
| 33 |
+
| `kyc_tier` | string | `tier_1`, `tier_2`, `tier_3`. |
|
| 34 |
+
|
| 35 |
+
### `telemetry_stream` — list<struct>
|
| 36 |
+
Ordered financial telemetry events. One struct per event.
|
| 37 |
+
|
| 38 |
+
Event struct:
|
| 39 |
+
|
| 40 |
+
| Field | Type | Notes |
|
| 41 |
+
|---|---|---|
|
| 42 |
+
| `timestamp` | string (ISO-8601) | Event time. |
|
| 43 |
+
| `event_name` | string | Event label (scenario-specific, e.g., `LARGE_WITHDRAWAL`, `LIMIT_ORDER_CANCELLED`, `LOGIN_NEW_COUNTRY`, `PASSWORD_CHANGE`, `OPPOSITE_SIDE_FILL`, `VACATION_PAYMENT`). |
|
| 44 |
+
| `asset` | string | `BTC`, `ETH`, `USDC`, `USDT`, `SOL`, `USD`, `EUR`, `GBP`, `JPY`. |
|
| 45 |
+
| `transaction_amount_usd` | double | USD-equivalent transaction amount. |
|
| 46 |
+
| `geo_country` | string | ISO-2 country code. |
|
| 47 |
+
| `latency_ms` | int | Observed latency for the event. |
|
| 48 |
+
| `burst_indicator` | bool | `true` during high-frequency burst phase. |
|
| 49 |
+
|
| 50 |
+
### `vulnerability` — struct
|
| 51 |
+
Scenario classification and exposure vector.
|
| 52 |
+
|
| 53 |
+
| Field | Type | Notes |
|
| 54 |
+
|---|---|---|
|
| 55 |
+
| `fraud_class` | string | `Account_Takeover_Sequence`, `Market_Manipulation_Spoofing`, `Legitimate_High_Risk_Activity`. |
|
| 56 |
+
| `scenario_description` | string | Short English description of the scenario. |
|
| 57 |
+
| `exposure_vector` | string | Primary exposure dimension (e.g., `credential_abuse`, `order_book_spoof`, `geo_anomaly`, `rapid_burst`, `session_hijack`, `benign_travel_pattern`). |
|
| 58 |
+
|
| 59 |
+
### `detection` — struct
|
| 60 |
+
Anomaly-signature metadata describing how this sequence would be detected in production.
|
| 61 |
+
|
| 62 |
+
| Field | Type | Notes |
|
| 63 |
+
|---|---|---|
|
| 64 |
+
| `anomaly_type` | string | One of: `temporal_burst_sequence`, `cancel_burst_with_opposite_fill`, `geo_travel_with_elevated_spend`. |
|
| 65 |
+
| `baseline_deviation` | string | Short English description of the deviation pattern (includes burst count and geo diversity). |
|
| 66 |
+
| `detection_logic` | string | SQL-like rule expression showing the production-style detector. |
|
| 67 |
+
| `anomaly_score` | double | 0–1. |
|
| 68 |
+
| `confidence_band` | string | `low` / `medium` / `high` / `very_high`. |
|
| 69 |
+
|
| 70 |
+
### `impact` — struct
|
| 71 |
+
Financial exposure attributable to the sequence.
|
| 72 |
+
|
| 73 |
+
| Field | Type | Notes |
|
| 74 |
+
|---|---|---|
|
| 75 |
+
| `financial_exposure_usd` | double | USD exposure during the burst (scaled down for benign sequences). |
|
| 76 |
+
| `customer_funds_at_risk_usd` | double | USD exposure to customer funds specifically. |
|
| 77 |
+
| `recoverable_pct` | double | 0–1. Estimated recoverable fraction. Lower for account takeovers. |
|
| 78 |
+
|
| 79 |
+
### `simulation` — struct
|
| 80 |
+
Simulation engine provenance and ground-truth label.
|
| 81 |
+
|
| 82 |
+
| Field | Type | Notes |
|
| 83 |
+
|---|---|---|
|
| 84 |
+
| `synthetic` | bool | Always `true`. |
|
| 85 |
+
| `engine` | string | Simulation engine label (`dark_pool_sim_v1`). |
|
| 86 |
+
| `chaos_profile` | string | `Temporal_Burst_Mode`, `Geo_Travel_Mode`, `Market_Stress_Mode`, `Calm_Baseline`, `Holiday_Season_Spike`. |
|
| 87 |
+
| `ground_truth_classification` | string | `fraudulent` or `benign`. Matches `event.label`. |
|
| 88 |
+
|
| 89 |
+
## Distribution of this sample
|
| 90 |
+
|
| 91 |
+
- 10,000 sequences total.
|
| 92 |
+
- Fraud class: balanced 3,333 per class across 3 classes (account takeover, spoofing, false-positive).
|
| 93 |
+
- Label: 2/3 `fraudulent`, 1/3 `benign` (by design — only the false-positive class is benign).
|
| 94 |
+
- Severity: scenario-weighted so spoofing skews mid, ATO skews high, false-positive skews low.
|
| 95 |
+
- Anomaly types: each fraud class maps to its own anomaly type.
|
| 96 |
+
|
| 97 |
+
## Sanitization notes
|
| 98 |
+
|
| 99 |
+
- Event IDs are synthetic (`DARKPOOL-*`).
|
| 100 |
+
- Account IDs are UUID-derived synthetic identifiers (`ACCT-A1B2C3...`).
|
| 101 |
+
- No real customer data, real transactions, real wallet addresses, or PII is present.
|
| 102 |
+
- `detection_logic` is illustrative SQL-style rule syntax; it is not connected to any real detection system.
|
| 103 |
+
- Country codes are used as generic geo labels, not as allegations about any specific jurisdiction's transaction profile.
|
| 104 |
+
|
| 105 |
+
## Relationship to the full pack
|
| 106 |
+
|
| 107 |
+
The production pack scales to 5M+ sequences with expanded scenario coverage (layering, smurfing, wash trading, sanctions-evasion routing, trade-based ML, bust-out fraud), additional asset classes (equities, FX, derivatives, NFTs), multi-entity transaction graphs, richer ambiguous-label distribution tuning, and SAR-narrative-aligned delivery. See the pack card for commercial access.
|
dark_pool_sample.jsonl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:787bad2f33a6aa9870467bd187b8334d1b4c1aa8c022eea38209ada1aac91d3c
|
| 3 |
+
size 25057697
|
dark_pool_sample.parquet
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:bdeab1230a9a576d781aa24ca1ea0208391dc45837a3c469baf7a23929377780
|
| 3 |
+
size 2734698
|