2020
DOI: 10.1109/access.2020.3011590
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Stock Price Manipulation Using Kernel Based Principal Component Analysis and Multivariate Density Estimation

Abstract: Stock price manipulation uses illegitimate means to artificially influence market prices of several stocks. It causes massive losses and undermines investors' confidence and the integrity of the stock market. Several existing research works focused on detecting a specific manipulation scheme using supervised learning but lacks the adaptive capability to capture different manipulative strategies. This begets the assumption of model parameter values specific to the underlying manipulation scheme. In addition, su… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 51 publications
(74 reference statements)
0
6
0
Order By: Relevance
“…Even though manipulations were effectively detected using their method, many normal cases were pinpointed incorrectly because the precision of the algorithm was low. There are three papers from the same group of researchers who implemented kernel density estimation (KDE) for stock manipulation detection [48], [49], [50]. They used an opensource LOBSTER database and injected manipulative patterns (e.g., such as sawtooth and spike pattern) into the normal trading data.…”
Section: B Methods For Identifying Market Manipulation Activitiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Even though manipulations were effectively detected using their method, many normal cases were pinpointed incorrectly because the precision of the algorithm was low. There are three papers from the same group of researchers who implemented kernel density estimation (KDE) for stock manipulation detection [48], [49], [50]. They used an opensource LOBSTER database and injected manipulative patterns (e.g., such as sawtooth and spike pattern) into the normal trading data.…”
Section: B Methods For Identifying Market Manipulation Activitiesmentioning
confidence: 99%
“…Rizvi et al [52] implemented AE using the information captured by the affinity matrix to detect stock price manipulation. They used the same dataset and injected the same manipulative patterns as in [50]. The input features were extracted using a discrete wavelet transform and were then used to compute affinity and grouped using the proposed clustering techniques.…”
Section: B Methods For Identifying Market Manipulation Activitiesmentioning
confidence: 99%
“…By employing labeled data, these models are trained to recognize and respond to the specific patterns they have been exposed to during the training process. This focused learning approach, however, introduces a significant limitation: the model's difficulty in identifying novel manipulation patterns-those which it has not been previously taught [8]. This inherent challenge emphasizes the need for models that can adapt to and detect emerging patterns of manipulation, thus extending beyond the confines of their initial training set.…”
Section: Introductionmentioning
confidence: 99%
“…Finally, they used clustering based on kernel density estimation (MKDE) to detect manipulated operations, where nonclustered data were treated as manipulated. Rizvi et al [8] used kernel PCA to obtain vectors of characteristics delivered to MKDE to detect manipulations. To this end, they used a dataset with information on 13 stocks from NASDAQ and the London Stock Exchange (LSE), with the information of manipulations generated in synthetic form.…”
Section: Introductionmentioning
confidence: 99%
“…Anomaly detection is a critical task in several applications, such as fraud detection [19], video surveillance [25], industrial defects [4], and medical image analysis [24], among others. In addition, it can be used as a preprocessing step in a machine learning system.…”
Section: Introductionmentioning
confidence: 99%