Computer Science ›› 2025, Vol. 52 ›› Issue (2): 125-133.doi: 10.11896/jsjkx.241000110
• Database & Big Data & Data Science • Previous Articles Next Articles
ZUO Xuhong1, WANG Yongquan1,2, QIU Geping1
CLC Number:
[1]SHEIKH I,SHEIKH G,EBERLE W.Mining Illegal InsiderTrading of Stocks:A Proactive Approach[C]//2018 IEEE International Conference on Big Data.2018:1397-1406. [2]Ningxia Regulatory Bureau of China Securities Regulatory Commission.Manifestations and policy boundaries of over-the-coun-ter capital allocation[EB/OL].(2022-06-20)[2024-08-31].http://www.csrc.gov.cn/ningxia/c105510/c3762207/content.shtml. [3]Shanghai Securities News.Focus on cracking down on systema-tic and large-scale over-the-counter capital allocation,the China Securities Regulatory Commission cooperated with the investigation and punishment of 19 major cases last year[EB/OL].(2022-05-06)[2024-08-31].https://news.stcn.com/news/202105/t20210506_3197077.html. [4]DENG J,PAN H,YAN H,et al.Disclosing and cooling-off:An analysis of insider trading rules[J].Journal of Financial Economics,2024,160:103913. [5]LEI J P.Research on the Legal Issues of OTC Capital Allocation:From the Perspective of the Nature of OTC Capital Allocation and Civil Legal Liability[J].Securities Law Review,2016(1):453-462. [6]HUANG S K.Reflection and Reconstruction on the Determination of the Validity of OTC Allocation Contracts[J].Journal of East China University of Political Science and Law,2021,24(1):125-138. [7]MIAO Y Z.Determination of the Validity of the Over-the-coun-ter Allocation Contract for Securities Trading and Its Forced Li-quidation Agreement[J].Jurisprudence,2017(5):97-106. [8]WANG L B.Implicit Guarantee in Financial Innovation:On the Private Law Roots of Financial Crisis[J].Law Review,2016(5):50-63. [9]MIAO Y Z.Attribute Integration and Regulatory Thinking ofSecurities Trading Allocation under the Pattern of Large Financial Regulation[J].Law Review,2024(1):112-122. [10]ZHOU X,LI H G.Buying on Margin and Short Selling in an Artificial Double Auction Market[J].Computational Economics,2019,54:1473-1489. [11]FORTUNE P.Security loans at banks and nonbanks:regulation U[J].New England Economic Review,Fourth Quarter,2002,4:19-40. [12]LEE K Y.Margin Requirements and Volatility:Evidence from Canadian Stocks[D].Canada:Brock University,2009. [13]LEE S B,YOO T Y.Margin Regulation and Stock Market Re-sponse:Further Evidence From the U.S.and Some Pacific-Basin Countries[J].Review of Financial Economics,1991,9:79-98. [14]BASOV S,BHATTI I.Can Short-Selling Prohibition Be Optimal?[J].Islamic Finance in the Light of Modern Economic Theory,2016,12:157-163. [15]CHEN H,ZHANG M,ZENG J,et al.Artificial intelligence and corporate risk-taking:Evidence from China[J].China Journal of Accounting Research,2024,17(3):100372. [16]HE Y,YANG P,WANG C S,et al.Research on website recognition based on deep neural network[J].Journal of Sichuan University:Natural Science Edition,2021,3:91-97. [17]HE B,XING R,LIU D Y,et al.A Method for Identifying Secu-rities Allocation Accounts Based on Supervised Machine Lear-ning:CN201611134189.9[P].CN106709513A[2024-12-10]. [18]HU P,WANG C,ZHANG L,et al.A method for identifying the capital account of the allocator and analyzing the network of the relationship between the capital transaction:CN202111548699.1[P].CN202111548699.1[2024-12-10]. [19]YU J Q,LI S H.Design and Application of Over-the-counter Allocation Recognition Algorithm Based on Machine Learning[J].Microcomputer Applications,2021,37(12):33-47. [20]SHIH C M,YANG K C,CHAO W P.Predicting stock price using Random Forest algorithm and support vector machines algorithm[C]//2023 IEEE International Conference on Industrial Engineering and Engineering Management.2023:133-137. [21]SHANG R,GAO L,CHI H,KONG J,et al.Non-convex feature selection based on feature correlation representation and dual manifold optimization[J].Expert Systems with Applications,2024,250:123867. [22]FU Q,ZHAO D,SHAO L,et al.Magnetic localization algorithm of capsule robot based on BP neural network[J].IEEE Transactions on Instrumentation and Measurement,2024,73:4002509. |
[1] | LIU Yuanhong, WU Yubin. Local Linear Embedding Algorithm Based on Probability Model and Information Entropy [J]. Computer Science, 2025, 52(6A): 240500021-8. |
[2] | WU Zhihua, CHENG Jianghua, LIU Tong, CAI Yahui, CHENG Bang, PAN Lehao. Human Target Detection Algorithm for Low-quality Laser Through-window Imaging [J]. Computer Science, 2025, 52(6A): 240600069-6. |
[3] | YANG Jixiang, JIANG Huiping, WANG Sen, MA Xuan. Research Progress and Challenges in Forest Fire Risk Prediction [J]. Computer Science, 2025, 52(6A): 240400177-8. |
[4] | WU Xingli, ZHANG Haoyue, LIAO Huchang. Review of Doctor Recommendation Methods and Applications for Consultation Platforms [J]. Computer Science, 2025, 52(5): 109-121. |
[5] | MIAO Zhuang, CUI Haoran, ZHANG Qiyang, WANG Jiabao, LI Yang. Restoration of Atmospheric Turbulence-degraded Images Based on Contrastive Learning [J]. Computer Science, 2025, 52(5): 171-178. |
[6] | KONG Yu, XIONG Fengguang, ZHANG Zhiqiang, SHEN Chaofan, HU Mingyue. Low Overlap Point Cloud Registration Method Based on Deep Position-aware Transformer [J]. Computer Science, 2025, 52(5): 199-211. |
[7] | JIAO Jian, CHEN Ruixiang, HE Qiang, QU Kaiyang, ZHANG Ziyi. Study on Smart Contract Vulnerability Repair Based on T5 Model [J]. Computer Science, 2025, 52(4): 362-368. |
[8] | LI Xiaolan, MA Yong. Study on Lightweight Flame Detection Algorithm with Progressive Adaptive Feature Fusion [J]. Computer Science, 2025, 52(4): 64-73. |
[9] | WANG Mengwei, YANG Zhe. Speaker Verification Method Based on Sub-band Front-end Model and Inverse Feature Fusion [J]. Computer Science, 2025, 52(3): 214-221. |
[10] | HAN Lin, WANG Yifan, LI Jianan, GAO Wei. Automatic Scheduling Search Optimization Method Based on TVM [J]. Computer Science, 2025, 52(3): 268-276. |
[11] | XIONG Qibing, MIAO Qiguang, YANG Tian, YUAN Benzheng, FEI Yangyang. Malicious Code Detection Method Based on Hybrid Quantum Convolutional Neural Network [J]. Computer Science, 2025, 52(3): 385-390. |
[12] | WANG Kangyue, CHENG Ming, XIE Yixiang, ZOU Xiaobing, LI Ming. Role-aware Speaker Diarization in Autism Interview Scenarios [J]. Computer Science, 2025, 52(2): 231-241. |
[13] | SHANG Qiuyan, LI Yicong, WEN Ruilin, MA Yinping, OUYANG Rongbin, FAN Chun. Two-stage Multi-factor Algorithm for Job Runtime Prediction Based on Usage Characteristics [J]. Computer Science, 2025, 52(2): 261-267. |
[14] | XIAO Xiao, BAI Zhengyao, LI Zekai, LIU Xuheng, DU Jiajin. Parallel Multi-scale with Attention Mechanism for Point Cloud Upsampling [J]. Computer Science, 2024, 51(8): 183-191. |
[15] | LI Haixia, SONG Danlei, KONG Jianing, SONG Yafei, CHANG Haiyan. Evaluation of Hyperparameter Optimization Techniques for Traditional Machine Learning Models [J]. Computer Science, 2024, 51(8): 242-255. |
|