Computer Science ›› 2025, Vol. 52 ›› Issue (2): 125-133.doi: 10.11896/jsjkx.241000110

• Database & Big Data & Data Science • Previous Articles     Next Articles

Study on Integrated Model of Securities Illegal Margin Trading Accounts Identification Based on Trading Behavior Characteristics

ZUO Xuhong1, WANG Yongquan1,2, QIU Geping1   

  1. 1 School of Law and Criminal Justice,East China University of Political Science and Law,Shanghai 201620,China
    2 Department of Intelligent Science and Information Law,East China University of Political Science and Law,Shanghai 201620,China
  • Received:2024-10-21 Revised:2024-12-09 Online:2025-02-15 Published:2025-02-17
  • About author:ZUO Xuhong,born in 1990,Ph.D candidate,national special economic investigation researcher.His main research interests include data mining and machine learning.
    WANG Yongquan,born in 1964,Ph.D,professor,Ph.D supervisor.His main research interests include big data and artificial intelligence,cyberspace security and cybercrime,digital forensics.
  • Supported by:
    National Key Research and Development Program of China(2023YFC3306100,2023YFC3306105,2023YFC3306103) and Major Projects of National Social Science Foundation(20&ZD199).

Abstract: In response to issues with securities illegal margin trading accounts,such as the scarcity of public data,the unscientific feature selection,the limited research on identification methods that are lack of precision,an integrated model for the identification of securities illegal margin trading accounts based on trading behavior characteristics(CFS-RF-BP) is proposed.This integrated model consists of four main steps:dataset construction,feature extraction,feature selection,and account identification.According to the characteristics of securities account trading data,a simulated dataset is automatically generated,and the relevant features of securities illegal margin trading accounts are detailed labeled and calculated.Using a heterogeneous feature selection model,combined with methods such as logarithm and normalization,the importance of seventeen essential features primarily associated with securities illegal margin trading accounts is evaluated,and five of these features are selected to form a key feature set.Based on this,the BP neural network is employed to construct the classifier for the integrated model of securities margin trading account identification,optimizing key parameters such as weights and biases,thereby achieving automatic classification of securities illegal margin trading accounts.Simulation experiments indicate that the proposed CFS-RF-BP model has achieved excellent results in terms of feature selection,precision,recall rate,and processing efficiency of identification.

Key words: Securities illegal margin trading, Securities trading data, Feature extraction, Account identification, machine learning

CLC Number: 

  • TP391
[1]SHEIKH I,SHEIKH G,EBERLE W.Mining Illegal InsiderTrading of Stocks:A Proactive Approach[C]//2018 IEEE International Conference on Big Data.2018:1397-1406.
[2]Ningxia Regulatory Bureau of China Securities Regulatory Commission.Manifestations and policy boundaries of over-the-coun-ter capital allocation[EB/OL].(2022-06-20)[2024-08-31].http://www.csrc.gov.cn/ningxia/c105510/c3762207/content.shtml.
[3]Shanghai Securities News.Focus on cracking down on systema-tic and large-scale over-the-counter capital allocation,the China Securities Regulatory Commission cooperated with the investigation and punishment of 19 major cases last year[EB/OL].(2022-05-06)[2024-08-31].https://news.stcn.com/news/202105/t20210506_3197077.html.
[4]DENG J,PAN H,YAN H,et al.Disclosing and cooling-off:An analysis of insider trading rules[J].Journal of Financial Economics,2024,160:103913.
[5]LEI J P.Research on the Legal Issues of OTC Capital Allocation:From the Perspective of the Nature of OTC Capital Allocation and Civil Legal Liability[J].Securities Law Review,2016(1):453-462.
[6]HUANG S K.Reflection and Reconstruction on the Determination of the Validity of OTC Allocation Contracts[J].Journal of East China University of Political Science and Law,2021,24(1):125-138.
[7]MIAO Y Z.Determination of the Validity of the Over-the-coun-ter Allocation Contract for Securities Trading and Its Forced Li-quidation Agreement[J].Jurisprudence,2017(5):97-106.
[8]WANG L B.Implicit Guarantee in Financial Innovation:On the Private Law Roots of Financial Crisis[J].Law Review,2016(5):50-63.
[9]MIAO Y Z.Attribute Integration and Regulatory Thinking ofSecurities Trading Allocation under the Pattern of Large Financial Regulation[J].Law Review,2024(1):112-122.
[10]ZHOU X,LI H G.Buying on Margin and Short Selling in an Artificial Double Auction Market[J].Computational Economics,2019,54:1473-1489.
[11]FORTUNE P.Security loans at banks and nonbanks:regulation U[J].New England Economic Review,Fourth Quarter,2002,4:19-40.
[12]LEE K Y.Margin Requirements and Volatility:Evidence from Canadian Stocks[D].Canada:Brock University,2009.
[13]LEE S B,YOO T Y.Margin Regulation and Stock Market Re-sponse:Further Evidence From the U.S.and Some Pacific-Basin Countries[J].Review of Financial Economics,1991,9:79-98.
[14]BASOV S,BHATTI I.Can Short-Selling Prohibition Be Optimal?[J].Islamic Finance in the Light of Modern Economic Theory,2016,12:157-163.
[15]CHEN H,ZHANG M,ZENG J,et al.Artificial intelligence and corporate risk-taking:Evidence from China[J].China Journal of Accounting Research,2024,17(3):100372.
[16]HE Y,YANG P,WANG C S,et al.Research on website recognition based on deep neural network[J].Journal of Sichuan University:Natural Science Edition,2021,3:91-97.
[17]HE B,XING R,LIU D Y,et al.A Method for Identifying Secu-rities Allocation Accounts Based on Supervised Machine Lear-ning:CN201611134189.9[P].CN106709513A[2024-12-10].
[18]HU P,WANG C,ZHANG L,et al.A method for identifying the capital account of the allocator and analyzing the network of the relationship between the capital transaction:CN202111548699.1[P].CN202111548699.1[2024-12-10].
[19]YU J Q,LI S H.Design and Application of Over-the-counter Allocation Recognition Algorithm Based on Machine Learning[J].Microcomputer Applications,2021,37(12):33-47.
[20]SHIH C M,YANG K C,CHAO W P.Predicting stock price using Random Forest algorithm and support vector machines algorithm[C]//2023 IEEE International Conference on Industrial Engineering and Engineering Management.2023:133-137.
[21]SHANG R,GAO L,CHI H,KONG J,et al.Non-convex feature selection based on feature correlation representation and dual manifold optimization[J].Expert Systems with Applications,2024,250:123867.
[22]FU Q,ZHAO D,SHAO L,et al.Magnetic localization algorithm of capsule robot based on BP neural network[J].IEEE Transactions on Instrumentation and Measurement,2024,73:4002509.
[1] LIU Yuanhong, WU Yubin. Local Linear Embedding Algorithm Based on Probability Model and Information Entropy [J]. Computer Science, 2025, 52(6A): 240500021-8.
[2] WU Zhihua, CHENG Jianghua, LIU Tong, CAI Yahui, CHENG Bang, PAN Lehao. Human Target Detection Algorithm for Low-quality Laser Through-window Imaging [J]. Computer Science, 2025, 52(6A): 240600069-6.
[3] YANG Jixiang, JIANG Huiping, WANG Sen, MA Xuan. Research Progress and Challenges in Forest Fire Risk Prediction [J]. Computer Science, 2025, 52(6A): 240400177-8.
[4] WU Xingli, ZHANG Haoyue, LIAO Huchang. Review of Doctor Recommendation Methods and Applications for Consultation Platforms [J]. Computer Science, 2025, 52(5): 109-121.
[5] MIAO Zhuang, CUI Haoran, ZHANG Qiyang, WANG Jiabao, LI Yang. Restoration of Atmospheric Turbulence-degraded Images Based on Contrastive Learning [J]. Computer Science, 2025, 52(5): 171-178.
[6] KONG Yu, XIONG Fengguang, ZHANG Zhiqiang, SHEN Chaofan, HU Mingyue. Low Overlap Point Cloud Registration Method Based on Deep Position-aware Transformer [J]. Computer Science, 2025, 52(5): 199-211.
[7] JIAO Jian, CHEN Ruixiang, HE Qiang, QU Kaiyang, ZHANG Ziyi. Study on Smart Contract Vulnerability Repair Based on T5 Model [J]. Computer Science, 2025, 52(4): 362-368.
[8] LI Xiaolan, MA Yong. Study on Lightweight Flame Detection Algorithm with Progressive Adaptive Feature Fusion [J]. Computer Science, 2025, 52(4): 64-73.
[9] WANG Mengwei, YANG Zhe. Speaker Verification Method Based on Sub-band Front-end Model and Inverse Feature Fusion [J]. Computer Science, 2025, 52(3): 214-221.
[10] HAN Lin, WANG Yifan, LI Jianan, GAO Wei. Automatic Scheduling Search Optimization Method Based on TVM [J]. Computer Science, 2025, 52(3): 268-276.
[11] XIONG Qibing, MIAO Qiguang, YANG Tian, YUAN Benzheng, FEI Yangyang. Malicious Code Detection Method Based on Hybrid Quantum Convolutional Neural Network [J]. Computer Science, 2025, 52(3): 385-390.
[12] WANG Kangyue, CHENG Ming, XIE Yixiang, ZOU Xiaobing, LI Ming. Role-aware Speaker Diarization in Autism Interview Scenarios [J]. Computer Science, 2025, 52(2): 231-241.
[13] SHANG Qiuyan, LI Yicong, WEN Ruilin, MA Yinping, OUYANG Rongbin, FAN Chun. Two-stage Multi-factor Algorithm for Job Runtime Prediction Based on Usage Characteristics [J]. Computer Science, 2025, 52(2): 261-267.
[14] XIAO Xiao, BAI Zhengyao, LI Zekai, LIU Xuheng, DU Jiajin. Parallel Multi-scale with Attention Mechanism for Point Cloud Upsampling [J]. Computer Science, 2024, 51(8): 183-191.
[15] LI Haixia, SONG Danlei, KONG Jianing, SONG Yafei, CHANG Haiyan. Evaluation of Hyperparameter Optimization Techniques for Traditional Machine Learning Models [J]. Computer Science, 2024, 51(8): 242-255.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!