{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:34:52Z","timestamp":1765888492339,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427241","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"277-290","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["On the Feasibility of Automating Stock Market Manipulation"],"prefix":"10.1145","author":[{"given":"Carter","family":"Yagemann","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, United States of America"}]},{"given":"Simon P.","family":"Chung","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Erkam","family":"Uzun","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, United States of America"}]},{"given":"Sai","family":"Ragam","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Brendan","family":"Saltaformaggio","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, United States of America"}]},{"given":"Wenke","family":"Lee","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"volume-title":"Proceedings of the 22nd Australia Finance Banking Conference. SSRN, 55","year":"2009","author":"Aitken J","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1093\/rfs\/5.3.503"},{"volume-title":"Measuring the Cost of Cybercrime","author":"Anderson Ross","key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-39498-0_12"},{"volume-title":"26th USENIX Security Symposium (USENIX Security 17)","year":"2017","author":"Antonakakis Manos","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","unstructured":"Samuel Assefa Danial Dervovic Mahmoud Mahfouz Tucker Balch Prashant Reddy and Manuela Veloso. [n.d.]. Generating synthetic data in finance: opportunities challenges and pitfalls. ([n.\u00a0d.]).  Samuel Assefa Danial Dervovic Mahmoud Mahfouz Tucker Balch Prashant Reddy and Manuela Veloso. [n.d.]. Generating synthetic data in finance: opportunities challenges and pitfalls. ([n.\u00a0d.])."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Rainer B\u00f6hme and Thorsten Holz. 2006. The Effect of Stock Spam on Financial Markets.  Rainer B\u00f6hme and Thorsten Holz. 2006. The Effect of Stock Spam on Financial Markets.","DOI":"10.2139\/ssrn.897431"},{"volume-title":"Coupled Hidden Markov Models for Complex Action Recognition","author":"Brand Matthew","key":"e_1_3_2_1_7_1"},{"volume-title":"Workshop on the Economics of Information Security. WEIS, 06\u201326","year":"2017","author":"Brunt Ryan","key":"e_1_3_2_1_8_1"},{"volume-title":"ABIDES: Towards High-Fidelity Market Simulation for AI Research. arXiv preprint arXiv:1904.12066(2019), 13.","year":"2019","author":"Byrd David","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835818"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2015.2480959"},{"key":"e_1_3_2_1_12_1","unstructured":"James Chen. [n.d.]. Large Cap (Big Cap). https:\/\/www.investopedia.com\/terms\/l\/large-cap.asp. Accessed: 2020-04-17.  James Chen. [n.d.]. Large Cap (Big Cap). https:\/\/www.investopedia.com\/terms\/l\/large-cap.asp. Accessed: 2020-04-17."},{"key":"e_1_3_2_1_13_1","unstructured":"Jay Clayton. [n.d.]. Statement on Status of the Consolidated Audit Trail. https:\/\/www.sec.gov\/news\/public-statement\/statement-status-consolidated-audit-trail. Accessed: 2020-08-21.  Jay Clayton. [n.d.]. Statement on Status of the Consolidated Audit Trail. https:\/\/www.sec.gov\/news\/public-statement\/statement-status-consolidated-audit-trail. Accessed: 2020-08-21."},{"key":"e_1_3_2_1_14_1","unstructured":"Yahoo Finance. [n.d.]. International Business Machines Corporation (IBM). https:\/\/finance.yahoo.com\/quote\/IBM\/history. Accessed: 2020-04-17.  Yahoo Finance. [n.d.]. International Business Machines Corporation (IBM). https:\/\/finance.yahoo.com\/quote\/IBM\/history. Accessed: 2020-04-17."},{"key":"e_1_3_2_1_15_1","unstructured":"FINRA. [n.d.]. The Consolidated Audit Trail. https:\/\/www.catnmsplan.com\/. Accessed: 2019-04-03.  FINRA. [n.d.]. The Consolidated Audit Trail. https:\/\/www.catnmsplan.com\/. Accessed: 2019-04-03."},{"key":"e_1_3_2_1_16_1","unstructured":"Maggie Fitzgerald. [n.d.]. Charles Schwab is Eliminating Online Commissions for Trading in US Stocks and ETFs. https:\/\/www.cnbc.com\/2019\/10\/01\/charles-schwab-is-eliminating-online-commissions-for-trading-in-us-stocks-and-etfs.html. Accessed: 2020-04-15.  Maggie Fitzgerald. [n.d.]. Charles Schwab is Eliminating Online Commissions for Trading in US Stocks and ETFs. https:\/\/www.cnbc.com\/2019\/10\/01\/charles-schwab-is-eliminating-online-commissions-for-trading-in-us-stocks-and-etfs.html. Accessed: 2020-04-15."},{"volume-title":"Spam Works: Evidence From Stock Touts and Corresponding Market Activity. Hastings Comm. & Ent. LJ(2007).","year":"2007","author":"Frieder Laura","key":"e_1_3_2_1_17_1"},{"volume-title":"Widespread Worry and the Stock Market. In Fourth International AAAI Conference on Weblogs and Social Media.","year":"2010","author":"Gilbert Eric","key":"e_1_3_2_1_18_1"},{"volume-title":"Multi-Asset Risk Modeling: Techniques for a Global Economy in an Electronic and Algorithmic Trading Era","author":"Glantz Morton","key":"e_1_3_2_1_19_1"},{"volume-title":"Time Series Contextual Anomaly Detection for Detecting Market Manipulation in Stock Market. In 2015 IEEE International Conference on Data Science and Advanced Analytics (DSAA). IEEE.","year":"2015","author":"Golmohammadi Koosha","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","unstructured":"Google. [n.d.]. Search operators you can use with Gmail. https:\/\/support.google.com\/mail\/answer\/7190?hl=en. Accessed: 2020-04-17.  Google. [n.d.]. Search operators you can use with Gmail. https:\/\/support.google.com\/mail\/answer\/7190?hl=en. Accessed: 2020-04-17."},{"volume-title":"On the Effects of Stock Spam E-Mails. Journal of Financial markets 11","year":"2008","author":"Hanke Michael","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455774"},{"volume-title":"Unchecked Intermediaries: Price Manipulation In an Emerging Stock Market. Journal of Financial Economics 78","year":"2005","author":"Khwaja Asim\u00a0Ijaz","key":"e_1_3_2_1_24_1"},{"volume-title":"How to Define Illegal Price Manipulation. American Economic Review 98","year":"2008","author":"Kyle S","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","unstructured":"Mark Langston. [n.d.]. How To: Building A Dark Web Scraper. https:\/\/justhackerthings.com\/post\/building-a-dark-web-scraper\/. Accessed: 2019-02-04.  Mark Langston. [n.d.]. How To: Building A Dark Web Scraper. https:\/\/justhackerthings.com\/post\/building-a-dark-web-scraper\/. Accessed: 2019-02-04."},{"volume-title":"Market Manipulation Detection Based on Classification Methods. Procedia Computer Science 122","year":"2017","author":"Li Aihua","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","unstructured":"Junyi Li Xintong Wang Yaoyang Lin Arunesh Sinha and Michael\u00a0P Wellman. 2018. Generating Realistic Stock Market Order Streams. (2018).  Junyi Li Xintong Wang Yaoyang Lin Arunesh Sinha and Michael\u00a0P Wellman. 2018. Generating Realistic Stock Market Order Streams. (2018)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2392622.2392634"},{"volume-title":"PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. In 21st USENIX Security Symposium ((USENIX) Security 12)","year":"2012","author":"McCoy Damon","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","unstructured":"Jianping Mei Guojun Wu and Chunsheng Zhou. 2004. Behavior Based Manipulation: Theory and Prosecution Evidence. (2004).  Jianping Mei Guojun Wu and Chunsheng Zhou. 2004. Behavior Based Manipulation: Theory and Prosecution Evidence. (2004)."},{"key":"e_1_3_2_1_32_1","unstructured":"Microsoft. [n.d.]. Mail flow rule actions in Exchange Online. https:\/\/docs.microsoft.com\/en-us\/exchange\/security-and-compliance\/mail-flow-rules\/mail-flow-rule-actions. Accessed: 2020-04-17.  Microsoft. [n.d.]. Mail flow rule actions in Exchange Online. https:\/\/docs.microsoft.com\/en-us\/exchange\/security-and-compliance\/mail-flow-rules\/mail-flow-rule-actions. Accessed: 2020-04-17."},{"key":"e_1_3_2_1_33_1","unstructured":"Microsoft. [n.d.]. Mail flow rules (transport rules) in Exchange Online. https:\/\/docs.microsoft.com\/en-us\/exchange\/security-and-compliance\/mail-flow-rules\/mail-flow-rules. Accessed: 2020-04-17.  Microsoft. [n.d.]. Mail flow rules (transport rules) in Exchange Online. https:\/\/docs.microsoft.com\/en-us\/exchange\/security-and-compliance\/mail-flow-rules\/mail-flow-rules. Accessed: 2020-04-17."},{"key":"e_1_3_2_1_34_1","unstructured":"Vaikkunth Mugunthan Antigoni Polychroniadou David Byrd and Tucker\u00a0Hybinette Balch. [n.d.]. SMPAI: Secure Multi-Party Computation for Federated Learning. ([n.\u00a0d.]).  Vaikkunth Mugunthan Antigoni Polychroniadou David Byrd and Tucker\u00a0Hybinette Balch. [n.d.]. SMPAI: Secure Multi-Party Computation for Federated Learning. ([n.\u00a0d.])."},{"key":"e_1_3_2_1_35_1","unstructured":"Maithijs Nelemans. 2007. Redefining Trade-Based Market Manipulation. Val. UL Rev. 42(2007).  Maithijs Nelemans. 2007. Redefining Trade-Based Market Manipulation. Val. UL Rev. 42(2007)."},{"volume-title":"Why Do Investors Pay Attention to Stock Spam?Jones Graduate School of Management","year":"2009","author":"Nelson K","key":"e_1_3_2_1_36_1"},{"volume-title":"Sentiment Analysis of Twitter Data for Predicting Stock Market Movements. In 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES). IEEE.","year":"2016","author":"Pagolu Venkata\u00a0Sasank","key":"e_1_3_2_1_37_1"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2751323.2751327"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDP2018.2018.00077"},{"key":"e_1_3_2_1_40_1","unstructured":"Mary-Ann Russon. [n.d.]. SIM Swap Fraud: The Multi-Million Pound Security Issue That UK Banks Won\u2019t Talk About. https:\/\/tinyurl.com\/y2ewsduz. Accessed: 2019-03-21.  Mary-Ann Russon. [n.d.]. SIM Swap Fraud: The Multi-Million Pound Security Issue That UK Banks Won\u2019t Talk About. https:\/\/tinyurl.com\/y2ewsduz. Accessed: 2019-03-21."},{"key":"e_1_3_2_1_41_1","unstructured":"Cheryl Scarboro. [n.d.]. SEC Charges Two Texas Swindlers In Penny Stock Spam Scam Involving Computer Botnets. https:\/\/www.sec.gov\/news\/press\/2007\/2007-130.htm. Accessed: 2019-02-04.  Cheryl Scarboro. [n.d.]. SEC Charges Two Texas Swindlers In Penny Stock Spam Scam Involving Computer Botnets. https:\/\/www.sec.gov\/news\/press\/2007\/2007-130.htm. Accessed: 2019-02-04."},{"key":"e_1_3_2_1_42_1","unstructured":"Cheryl Scarboro. [n.d.]. SEC Obtains Order Freezing $3 Million in Proceeds of Suspected Foreign-Based Account Intrusion Scheme. https:\/\/www.sec.gov\/litigation\/litreleases\/2007\/lr20030.htm. Accessed: 2019-02-27.  Cheryl Scarboro. [n.d.]. SEC Obtains Order Freezing $3 Million in Proceeds of Suspected Foreign-Based Account Intrusion Scheme. https:\/\/www.sec.gov\/litigation\/litreleases\/2007\/lr20030.htm. Accessed: 2019-02-27."},{"key":"e_1_3_2_1_43_1","unstructured":"SEC. [n.d.]. SEC Charges Firms Involved in Layering Manipulation Schemes. https:\/\/www.sec.gov\/news\/pressrelease\/2017-63.html. Accessed: 2020-08-20.  SEC. [n.d.]. SEC Charges Firms Involved in Layering Manipulation Schemes. https:\/\/www.sec.gov\/news\/pressrelease\/2017-63.html. Accessed: 2020-08-20."},{"key":"e_1_3_2_1_44_1","unstructured":"SEC. [n.d.]. SEC Files Charges in $26 Million Stock Manipulation Scheme. https:\/\/www.sec.gov\/news\/pressrelease\/2016-261.html. Accessed: 2020-08-21.  SEC. [n.d.]. SEC Files Charges in $26 Million Stock Manipulation Scheme. https:\/\/www.sec.gov\/news\/pressrelease\/2016-261.html. Accessed: 2020-08-21."},{"key":"e_1_3_2_1_45_1","unstructured":"SEC. [n.d.]. Trading Basics: Understanding the Different Ways to Buy and Sell Stock. https:\/\/www.sec.gov\/investor\/alerts\/trading101basics.pdf. Accessed: 2019-02-04.  SEC. [n.d.]. Trading Basics: Understanding the Different Ways to Buy and Sell Stock. https:\/\/www.sec.gov\/investor\/alerts\/trading101basics.pdf. Accessed: 2019-02-04."},{"volume-title":"An Agent-Based Model of Financial Benchmark Manipulation. In ICML-19 Workshop on AI in Finance.","year":"2019","author":"Shearer Megan","key":"e_1_3_2_1_46_1"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339683"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653738"},{"key":"e_1_3_2_1_49_1","unstructured":"Trillium. [n.d.]. Recent Trade Surveillance Enforcement Actions. https:\/\/www.trlm.com\/knowledgebase\/recent-trade-surveillance-enforcement-actions. Accessed: 2019-05-04.  Trillium. [n.d.]. Recent Trade Surveillance Enforcement Actions. https:\/\/www.trlm.com\/knowledgebase\/recent-trade-surveillance-enforcement-actions. Accessed: 2019-05-04."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Manuel\u00a0R Vargas Beatriz\u00a0SLP De\u00a0Lima and Alexandre\u00a0G Evsukoff. 2017. Deep Learning for Stock Market Prediction From Financial News Articles. In 2017 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA). IEEE.  Manuel\u00a0R Vargas Beatriz\u00a0SLP De\u00a0Lima and Alexandre\u00a0G Evsukoff. 2017. Deep Learning for Stock Market Prediction From Financial News Articles. In 2017 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA). IEEE.","DOI":"10.1109\/CIVEMSA.2017.7995302"},{"volume-title":"Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems. International Foundation for Autonomous Agents and Multiagent Systems.","year":"2017","author":"Wang Xintong","key":"e_1_3_2_1_51_1"},{"volume-title":"Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems. International Foundation for Autonomous Agents and Multiagent Systems.","year":"2018","author":"Wright Mason","key":"e_1_3_2_1_52_1"},{"volume-title":"28th USENIX Security Symposium (USENIX Security 19)","year":"2019","author":"Xu Jiahua","key":"e_1_3_2_1_53_1"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","acronym":"ACSAC '20","location":"Austin USA"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427241","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427241","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:24Z","timestamp":1750197744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427241"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":53,"alternative-id":["10.1145\/3427228.3427241","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427241","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}