{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T04:59:50Z","timestamp":1774414790425,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EPJ Data Sci."],"DOI":"10.1140\/epjds\/s13688-024-00500-2","type":"journal-article","created":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T16:02:59Z","timestamp":1730131379000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A machine learning approach to support decision in insider trading detection"],"prefix":"10.1140","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7198-513X","authenticated-orcid":false,"given":"Piero","family":"Mazzarisi","sequence":"first","affiliation":[]},{"given":"Adele","family":"Ravagnani","sequence":"additional","affiliation":[]},{"given":"Paola","family":"Deriu","sequence":"additional","affiliation":[]},{"given":"Fabrizio","family":"Lillo","sequence":"additional","affiliation":[]},{"given":"Francesca","family":"Medda","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Russo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,28]]},"reference":[{"key":"500_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6396-2","volume-title":"Outlier analysis","author":"CC Aggarwal","year":"2013","unstructured":"Aggarwal CC (2013) Outlier analysis. Springer, New York"},{"issue":"1","key":"500_CR2","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.jfineco.2017.03.009","volume":"125","author":"KR Ahern","year":"2017","unstructured":"Ahern KR (2017) Information networks: evidence from illegal insider trading tips. J Financ Econ 125(1):26\u201347","journal-title":"J Financ Econ"},{"key":"500_CR3","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/s10618-014-0365-y","volume":"29","author":"L Akoglu","year":"2015","unstructured":"Akoglu L, Tong H, Koutra D (2015) Graph based anomaly detection and description: a survey. Data Min Knowl Discov 29:626\u2013688","journal-title":"Data Min Knowl Discov"},{"issue":"12","key":"500_CR4","doi-asserted-by":"publisher","first-page":"5697","DOI":"10.1287\/mnsc.2018.3122","volume":"65","author":"P Augustin","year":"2019","unstructured":"Augustin P, Brenner M, Subrahmanyam MG (2019) Informed options trading prior to takeover announcements: insider trading? Manag Sci 65(12):5697\u20135720","journal-title":"Manag Sci"},{"issue":"1","key":"500_CR5","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-022-00368-0","volume":"11","author":"M Baltakiene","year":"2022","unstructured":"Baltakiene M, Baltakys K, Kanniainen J (2022) Trade synchronization and social ties in stock markets. EPJ Data Sci 11(1):54","journal-title":"EPJ Data Sci"},{"issue":"1","key":"500_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1057\/s41599-019-0342-6","volume":"5","author":"M Baltakiene","year":"2019","unstructured":"Baltakiene M, Baltakys K, Kanniainen J, Pedreschi D, Lillo F (2019) Clusters of investors around initial public offering. Palgrave Commun 5(1):1\u201314","journal-title":"Palgrave Commun"},{"issue":"2","key":"500_CR7","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/S0377-2217(01)00112-6","volume":"136","author":"JP Barth\u00e9lemy","year":"2002","unstructured":"Barth\u00e9lemy JP, Bisdorff R, Coppin G (2002) Human centered processes and decision support systems. Eur J Oper Res 136(2):233\u2013252","journal-title":"Eur J Oper Res"},{"issue":"1","key":"500_CR8","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1111\/j.2517-6161.1995.tb02031.x","volume":"57","author":"Y Benjamini","year":"1995","unstructured":"Benjamini Y, Hochberg Y (1995) Controlling the false discovery rate: a practical and powerful approach to multiple testing. J R Stat Soc, Ser B, Methodol 57(1):289\u2013300","journal-title":"J R Stat Soc, Ser B, Methodol"},{"issue":"1","key":"500_CR9","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1111\/1540-6261.00416","volume":"57","author":"U Bhattacharya","year":"2002","unstructured":"Bhattacharya U, Daouk H (2002) The world price of insider trading. J Finance 57(1):75\u2013108","journal-title":"J Finance"},{"issue":"10","key":"500_CR10","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008","volume":"2008","author":"VD Blondel","year":"2008","unstructured":"Blondel VD, Guillaume JL, Lambiotte R, Lefebvre E (2008) Fast unfolding of communities in large networks. J Stat Mech Theory Exp 2008(10):P10008","journal-title":"J Stat Mech Theory Exp"},{"key":"500_CR11","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-10377-8_1","volume-title":"Measuring scholarly impact","author":"L Bohlin","year":"2014","unstructured":"Bohlin L, Edler D, Lancichinetti A, Rosvall M (2014) Community detection and visualization of networks with the map equation framework. In: Measuring scholarly impact. Springer, Cham, pp\u00a03\u201334"},{"issue":"2","key":"500_CR12","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.96.022321","volume":"96","author":"C Bongiorno","year":"2017","unstructured":"Bongiorno C, London A, Miccich\u00e8 S, Mantegna RN (2017) Core of communities in bipartite networks. Phys Rev E 96(2):022321","journal-title":"Phys Rev E"},{"issue":"3","key":"500_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41(3):1\u201358","journal-title":"ACM Comput Surv"},{"key":"500_CR14","unstructured":"De Jong W (2013) Tackling financial market abuse in the EU. Library of the European Parliament 22. 2013"},{"key":"500_CR15","unstructured":"Decreto legislativo 24 febbraio 1998, n. 58. https:\/\/www.consob.it\/documents\/art184d.lgs.n.58\/98"},{"key":"500_CR16","unstructured":"Deriu P, Lillo F, Mazzarisi P, Medda F, Ravagnani A (2022). Preprint at. https:\/\/arxiv.org\/abs\/2208.00181"},{"key":"500_CR17","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1145\/1014052.1014100","volume-title":"Proceedings of the tenth ACM SIGKDD international conference on knowledge discovery and data mining","author":"S Donoho","year":"2004","unstructured":"Donoho S (2004) Early detection of insider trading in option markets. In: Proceedings of the tenth ACM SIGKDD international conference on knowledge discovery and data mining, pp\u00a0420\u2013429"},{"key":"500_CR18","unstructured":"EU Legislation Summaries: Market abuse. https:\/\/eur-lex.europa.eu\/summaries"},{"issue":"2","key":"500_CR19","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1111\/irfi.12006","volume":"13","author":"A Frino","year":"2013","unstructured":"Frino A, Satchell S, Wong B, Zheng H (2013) How much does an illegal insider trade? Int Rev Finance 13(2):241\u2013263","journal-title":"Int Rev Finance"},{"issue":"4","key":"500_CR20","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0152173","volume":"11","author":"M Goldstein","year":"2016","unstructured":"Goldstein M, Uchida S (2016) A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data. PLoS ONE 11(4):e0152173","journal-title":"PLoS ONE"},{"key":"500_CR21","first-page":"435","volume-title":"Proc. Int. conf. Data Sci. Adv. Anal. (DSAA)","author":"K Golmohammadi","year":"2014","unstructured":"Golmohammadi K, Zaiane OR, D\u00edaz D (2014) Detecting stock market manipulation using supervised learning algorithms. In: Proc. Int. conf. Data Sci. Adv. Anal. (DSAA), pp\u00a0435\u2013441"},{"key":"500_CR22","volume-title":"Deep learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow I, Bengio Y, Courville A (2016) Deep learning. MIT Press, Cambridge. deeplearningbook.org"},{"key":"500_CR23","volume-title":"Clustering algorithms","author":"JA Hartigan","year":"1975","unstructured":"Hartigan JA (1975) Clustering algorithms. Wiley, New York"},{"key":"500_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84858-7","volume-title":"The elements of statistical learning: data mining, inference, and prediction","author":"T Hastie","year":"2009","unstructured":"Hastie T, Tibshirani R, Friedman JH, Friedman JH (2009) The elements of statistical learning: data mining, inference, and prediction, vol\u00a02. Springer, New York, pp\u00a01\u2013758"},{"key":"500_CR25","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.csda.2012.10.006","volume":"59","author":"Y Hong","year":"2013","unstructured":"Hong Y (2013) On computing the distribution function for the Poisson binomial distribution. Comput Stat Data Anal 59:41\u201351","journal-title":"Comput Stat Data Anal"},{"key":"500_CR26","volume-title":"Principal component analysis","author":"IT Jolliffe","year":"2002","unstructured":"Jolliffe IT (2002) Principal component analysis. Springer, New York"},{"issue":"4","key":"500_CR27","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1111\/j.1540-6261.1981.tb04888.x","volume":"36","author":"AJ Keown","year":"1981","unstructured":"Keown AJ, Pinkerton JM (1981) Merger announcements and insider trading activity: an empirical investigation. J Finance 36(4):855\u2013869","journal-title":"J Finance"},{"key":"500_CR28","doi-asserted-by":"crossref","unstructured":"Kyle AS (1985) Continuous auctions and insider trading. Econometrica, 1315\u20131335","DOI":"10.2307\/1913210"},{"issue":"12","key":"500_CR29","doi-asserted-by":"publisher","first-page":"14891","DOI":"10.1016\/j.eswa.2011.05.058","volume":"38","author":"S Lee","year":"2011","unstructured":"Lee S, Kim G, Kim S (2011) Self-adaptive and dynamic clustering for online anomaly detection. Expert Syst Appl 38(12):14891\u201314898","journal-title":"Expert Syst Appl"},{"key":"500_CR30","doi-asserted-by":"publisher","first-page":"788","DOI":"10.1016\/j.procs.2017.11.438","volume":"122","author":"A Li","year":"2017","unstructured":"Li A, Wu J, Liu Z (2017) Market manipulation detection based on classification methods. Proc Comput Sci 122:788\u2013795","journal-title":"Proc Comput Sci"},{"issue":"2","key":"500_CR31","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/TIT.1982.1056489","volume":"28","author":"S Lloyd","year":"1982","unstructured":"Lloyd S (1982) Least squares quantization in PCM. IEEE Trans Inf Theory 28(2):129\u2013137","journal-title":"IEEE Trans Inf Theory"},{"key":"500_CR32","unstructured":"Mejri, et al (2022) Unsupervised Anomaly Detection in Time-series: an Extensive Evaluation and Analysis of State-of-the-art Methods. arXiv:2212.03637"},{"issue":"5","key":"500_CR33","doi-asserted-by":"publisher","first-page":"1661","DOI":"10.1111\/j.1540-6261.1992.tb04679.x","volume":"47","author":"LK Meulbroek","year":"1992","unstructured":"Meulbroek LK (1992) An empirical analysis of illegal insider trading. J Finance 47(5):1661\u20131699","journal-title":"J Finance"},{"key":"500_CR34","unstructured":"Minenna M (2003) The detection of market abuse on financial markets: a quantitative approach. Quad Finanza 54"},{"key":"500_CR35","unstructured":"Morgia ML, Mei A, Sassi F, Stefa J (2021) The doge of wall street: analysis and detection of pump and dump cryptocurrency manipulations. ACM Transactions on Internet Technology (TOIT)"},{"issue":"26","key":"500_CR36","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2015573118","volume":"118","author":"F Musciotto","year":"2021","unstructured":"Musciotto F, Piilo J, Mantegna RN (2021) High-frequency trading and networked markets. Proc Natl Acad Sci 118(26):e2015573118","journal-title":"Proc Natl Acad Sci"},{"issue":"9","key":"500_CR37","doi-asserted-by":"publisher","first-page":"2110","DOI":"10.1016\/j.jbankfin.2010.01.018","volume":"34","author":"YS Park","year":"2010","unstructured":"Park YS, Lee J (2010) Detecting insider trading: the theory and validation in Korea exchange. J Bank Finance 34(9):2110\u20132120","journal-title":"J Bank Finance"},{"key":"500_CR38","unstructured":"Ravagnani A, Lillo F, Deriu P, Mazzarisi P, Medda F, Russo A Dimensionality reduction techniques to support insider trading detection. https:\/\/arxiv.org\/abs\/2403.00707"},{"issue":"5","key":"500_CR39","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/aa6b38","volume":"19","author":"F Saracco","year":"2017","unstructured":"Saracco F, Straka MJ, Di Clemente R, Gabrielli A, Caldarelli G, Squartini T (2017) Inferring monopartite projections of bipartite networks: an entropy-based approach. New J Phys 19(5):053022","journal-title":"New J Phys"},{"issue":"5","key":"500_CR40","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1109\/TKDE.2007.1009","volume":"19","author":"X Song","year":"2007","unstructured":"Song X, Wu M, Jermaine C, Ranka S (2007) Conditional anomaly detection. IEEE Trans Knowl Data Eng 19(5):631\u2013645","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"1","key":"500_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/2193-2409-1-8","volume":"1","author":"E Thalassinos","year":"2012","unstructured":"Thalassinos E, Maditinos D, Paschalidis A (2012) Observing evidence of insider trading in the Athens stock exchange. J Economic Structures 1(1):1\u201326","journal-title":"J Economic Structures"},{"issue":"1","key":"500_CR42","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/14\/1\/013041","volume":"14","author":"M Tumminello","year":"2012","unstructured":"Tumminello M, Lillo F, Piilo J, Mantegna RN (2012) Identification of clusters of investors from their real trading activity in a financial market. New J Phys 14(1):013041","journal-title":"New J Phys"},{"issue":"3","key":"500_CR43","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0017994","volume":"6","author":"M Tumminello","year":"2011","unstructured":"Tumminello M, Micciche S, Lillo F, Piilo J, Mantegna RN (2011) Statistically validated networks in bipartite complex systems. PLoS ONE 6(3):e17994","journal-title":"PLoS ONE"},{"key":"500_CR44","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.cose.2015.09.005","volume":"57","author":"J West","year":"2016","unstructured":"West J, Bhattacharya M (2016) Intelligent financial fraud detection: a comprehensive review. Comput Secur 57:47\u201366","journal-title":"Comput Secur"},{"key":"500_CR45","doi-asserted-by":"crossref","unstructured":"Wu X, Xiao L, Sun Y, Zhang J, Ma T, He L (2022) A survey of human-in-the-loop for machine learning. Future Gener Comput Syst","DOI":"10.1016\/j.future.2022.05.014"}],"container-title":["EPJ Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1140\/epjds\/s13688-024-00500-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1140\/epjds\/s13688-024-00500-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1140\/epjds\/s13688-024-00500-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T16:03:25Z","timestamp":1730131405000},"score":1,"resource":{"primary":{"URL":"https:\/\/epjdatascience.springeropen.com\/articles\/10.1140\/epjds\/s13688-024-00500-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":45,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["500"],"URL":"https:\/\/doi.org\/10.1140\/epjds\/s13688-024-00500-2","relation":{},"ISSN":["2193-1127"],"issn-type":[{"value":"2193-1127","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,28]]},"assertion":[{"value":"28 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"66"}}