Large-scale insider trading analysis: patterns and discoveries
暂无分享,去创建一个
Shamkant B. Navathe | Duen Horng Chau | Bo Xie | Acar Tamersoy | Elias Boutros Khalil | Bryan R. Routledge | Stephen L. Lenkey | Bo Xie | Acar Tamersoy | S. Navathe
[1] J. Lorie,et al. Predictive and Statistical Properties of Insider Trading , 1968, The Journal of Law and Economics.
[2] Dan Bernhardt,et al. Investment and Insider Trading , 1995 .
[3] Terrance Odean,et al. Are Investors Reluctant to Realize Their Losses? , 1996 .
[4] J. Sweeney,et al. Fraudulently Misstated Financial Statements and Insider Trading: An Empirical Analysis , 1997 .
[5] Andrew Chin. Accurate Calculation of Short-Swing Profits Under Section 16(b) of the Securities Exchange Act of 1934 , 1997 .
[6] David Aboody,et al. CEO stock option awards and the timing of corporate voluntary disclosures , 2000 .
[7] Josef Lakonishok,et al. Are Insider Trades Informative , 2001 .
[8] Dennis Lee,et al. The NASD Securities Observation, New Analysis and Regulation System (SONAR) , 2003, IAAI.
[9] Deepayan Chakrabarti,et al. AutoPart: Parameter-Free Graph Partitioning and Outlier Detection , 2004, PKDD.
[10] Steven K. Donoho,et al. Early detection of insider trading in option markets , 2004, KDD.
[11] Philip S. Yu,et al. Mining Extremely Skewed Trading Anomalies , 2004, EDBT.
[12] Jimeng Sun,et al. Neighborhood formation and anomaly detection in bipartite graphs , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[13] Qiang Cheng,et al. Insider Trading and Voluntary Disclosures , 2006 .
[14] Stephen D. Bay,et al. Large Scale Detection of Irregularities in Accounting Data , 2006, Sixth International Conference on Data Mining (ICDM'06).
[15] Michael Lemmon,et al. Option Backdating and Board Interlocks , 2007 .
[16] Christos Faloutsos,et al. Netprobe: a fast and scalable system for fraud detection in online auction networks , 2007, WWW '07.
[17] Lawrence B. Holder,et al. Discovering Structural Anomalies in Graph-Based Data , 2007 .
[18] Yannis Manolopoulos,et al. Data Mining techniques for the detection of fraudulent financial statements , 2007, Expert Syst. Appl..
[19] Andrew W. Lo,et al. What Happened To The Quants In August 2007?: Evidence from Factors and Transactions Data , 2008 .
[20] Pang-Ning Tan,et al. Outrank: a Graph-Based Outlier Detection Framework Using Random Walk , 2008, Int. J. Artif. Intell. Tools.
[21] P. Grégoire. INSIDER TRADING AND VOLUNTARY DISCLOSURE , 2008 .
[22] Lada A. Adamic,et al. On the Informational Properties of Trading Networks , 2009 .
[23] Christos Faloutsos,et al. SNARE: a link analytic system for graph labeling and risk detection , 2009, KDD.
[24] Xiumin Martin,et al. Voluntary Disclosures and the Exercise of CEO Stock Options , 2010 .
[25] Christos Faloutsos,et al. oddball: Spotting Anomalies in Weighted Graphs , 2010, PAKDD.
[26] Christopher J. Malloy,et al. Decoding Inside Information , 2010 .
[27] Anup Agrawal,et al. Insider Trading in Takeover Targets , 2011 .
[28] Aristides Gionis,et al. Correlating financial time series with micro-blogging activity , 2012, WSDM '12.
[29] Shamkant B. Navathe,et al. Inside insider trading: Patterns & discoveries from a large scale exploratory analysis , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).
[30] Anup Agrawal,et al. Insider Trading Before Accounting Scandals , 2015 .