{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T21:10:23Z","timestamp":1769634623227,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","funder":[{"name":"KAUST GenAI CoE","award":["5940"],"award-info":[{"award-number":["5940"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,15]]},"DOI":"10.1145\/3768292.3770393","type":"proceedings-article","created":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T07:24:26Z","timestamp":1763105066000},"page":"71-79","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["TSTR for Financial Fraud: Learning to Detect Manipulation Without Real Data"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4694-5336","authenticated-orcid":false,"given":"Ahmed","family":"Mahrous","sequence":"first","affiliation":[{"name":"King Abdullah University of Science and Technology, Thuwal, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1909-0336","authenticated-orcid":false,"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[{"name":"King Abdullah University of Science and Technology, Thuwal, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2025,11,14]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.5555\/2778285"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"crossref","unstructured":"Franklin Allen and Douglas Gale. 1992. Stock-price manipulation. The Review of Financial Studies 5 3 (1992) 503\u2013529.","DOI":"10.1093\/rfs\/5.3.503"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC56567.2023.10174922"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"crossref","unstructured":"Eoin Brophy Zhengwei Wang Qi She and Tom\u00e1s Ward. 2023. Generative adversarial networks in time series: A systematic literature review. Comput. Surveys 55 10 (2023) 1\u201331.","DOI":"10.1145\/3559540"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"crossref","unstructured":"Hans Buehler Blanka Horvath Terry Lyons Imanol\u00a0Perez Arribas and Ben Wood. 2020. A data-driven market simulator for small data environments. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2006.14498 (2020).","DOI":"10.2139\/ssrn.3632431"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"crossref","unstructured":"Lanouar Charfeddine and Ahmed Mahrous. 2024. What drives cryptocurrency pump and dump schemes: Coin versus market factors? Finance Research Letters 67 (2024) 105861.","DOI":"10.1016\/j.frl.2024.105861"},{"key":"e_1_3_3_2_8_2","unstructured":"Andrea Coletta Sriram Gopalakrishnan Daniel Borrajo and Svitlana Vyetrenko. 2024. On the constrained time-series generation problem. Advances in Neural Information Processing Systems 36 (2024)."},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"Angus Dempster Fran\u00e7ois Petitjean and Geoffrey\u00a0I Webb. 2020. ROCKET: exceptionally fast and accurate time series classification using random convolutional kernels. Data Mining and Knowledge Discovery 34 5 (2020) 1454\u20131495.","DOI":"10.1007\/s10618-020-00701-z"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Anirudh Dhawan and T\u0101lis\u00a0J Putni\u0146\u0161. 2023. A new wolf in town? Pump-and-dump manipulation in cryptocurrency markets. Review of Finance 27 3 (2023) 935\u2013975.","DOI":"10.1093\/rof\/rfac051"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"crossref","unstructured":"Mihai Dogariu Liviu-Daniel \u015etefan Bogdan\u00a0Andrei Boteanu Claudiu Lamba Bomi Kim and Bogdan Ionescu. 2022. Generation of realistic synthetic financial time-series. ACM Transactions on Multimedia Computing Communications and Applications (TOMM) 18 4 (2022) 1\u201327.","DOI":"10.1145\/3501305"},{"key":"e_1_3_3_2_12_2","unstructured":"Crist\u00f3bal Esteban Stephanie\u00a0L Hyland and Gunnar R\u00e4tsch. 2017. Real-valued (medical) time series generation with recurrent conditional gans. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1706.02633 (2017)."},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2017.106"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"Rao Fu Jie Chen Shutian Zeng Yiping Zhuang and Agus Sudjianto. 2019. Time series simulation by conditional generative adversarial net. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1904.11419 (2019).","DOI":"10.2139\/ssrn.3373730"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"crossref","unstructured":"Sihao Hu Zhen Zhang Shengliang Lu Bingsheng He and Zhao Li. 2023. Sequence-based target coin prediction for cryptocurrency pump-and-dump. Proceedings of the ACM on Management of Data 1 1 (2023) 1\u201319.","DOI":"10.1145\/3588686"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"crossref","unstructured":"Josh Kamps and Bennett Kleinberg. 2018. To the moon: defining and detecting cryptocurrency pump-and-dumps. Crime Science 7 1 (2018) 1\u201318.","DOI":"10.1186\/s40163-018-0093-5"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"crossref","unstructured":"Samira Khodabandehlou and Seyyed Alireza\u00a0Hashemi Golpayegani. 2022. Market manipulation detection: A systematic literature review. Expert Systems with Applications 210 (2022) 118330.","DOI":"10.1016\/j.eswa.2022.118330"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3427921.3450257"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"crossref","unstructured":"Tao Li Donghwa Shin and Baolian Wang. 2018. Cryptocurrency pump-and-dump schemes. Journal of Financial and Quantitative Analysis (2018) 1\u201359.","DOI":"10.2139\/ssrn.3267041"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3533271.3561704"},{"key":"e_1_3_3_2_21_2","unstructured":"Chung\u00a0I Lu and Julian Sester. 2024. Generative model for financial time series trained with MMD using a signature kernel. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2407.19848 (2024)."},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"crossref","unstructured":"Huy Nghiem Goran Muric Fred Morstatter and Emilio Ferrara. 2021. Detecting cryptocurrency pump-and-dump frauds using market and social signals. Expert Systems with Applications 182 (2021) 115284.","DOI":"10.1016\/j.eswa.2021.115284"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3490354.3494393"},{"key":"e_1_3_3_2_24_2","unstructured":"Ali Rahimi and Benjamin Recht. 2007. Random features for large-scale kernel machines. Advances in neural information processing systems 20 (2007)."},{"key":"e_1_3_3_2_25_2","unstructured":"Rikli Samuel Bigler\u00a0Daniel Nico Pfenninger Moritz and Osterrieder Joerg. 2021. Wasserstein GAN: Deep Generation applied on Bitcoins financial time series. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2107.06008 (2021)."},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"crossref","unstructured":"Michael Siering Benjamin Clapham Oliver Engel and Peter Gomber. 2017. A taxonomy of financial market manipulations: establishing trust and market integrity in the financialized economy through automated fraud detection. Journal of Information Technology 32 3 (2017) 251\u2013269.","DOI":"10.1057\/s41265-016-0029-z"},{"key":"e_1_3_3_2_27_2","unstructured":"Kaleb\u00a0E Smith and Anthony\u00a0O Smith. 2020. Conditional GAN for timeseries generation. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2006.16477 (2020)."},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"crossref","unstructured":"Michael Stenger Robert Leppich Ian Foster Samuel Kounev and Andr\u00e9 Bauer. 2024. Evaluation is key: a survey on evaluation measures for synthetic time series. Journal of Big Data 11 1 (2024) 1\u201356.","DOI":"10.1186\/s40537-024-00924-7"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"crossref","unstructured":"Shweta Tiwari Heri Ramampiaro and Helge Langseth. 2021. Machine learning in financial market surveillance: A survey. Ieee Access 9 (2021) 159734\u2013159754.","DOI":"10.1109\/ACCESS.2021.3130843"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2019.00045"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"crossref","unstructured":"Magnus Wiese Robert Knobloch Ralf Korn and Peter Kretschmer. 2020. Quant GANs: deep generation of financial time series. Quantitative Finance 20 9 (2020) 1419\u20131440.","DOI":"10.1080\/14697688.2020.1730426"},{"key":"e_1_3_3_2_32_2","first-page":"1609","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Xu Jiahua","year":"2019","unstructured":"Jiahua Xu and Benjamin Livshits. 2019. The anatomy of a cryptocurrency { Pump-and-Dump} scheme. In 28th USENIX Security Symposium (USENIX Security 19). 1609\u20131625."}],"event":{"name":"ICAIF '25: 6th ACM International Conference on AI in Finance","location":"Singapore Singapore","acronym":"ICAIF '25"},"container-title":["Proceedings of the 6th ACM International Conference on AI in Finance"],"original-title":[],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T07:34:12Z","timestamp":1763105652000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3768292.3770393"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,14]]},"references-count":31,"alternative-id":["10.1145\/3768292.3770393","10.1145\/3768292"],"URL":"https:\/\/doi.org\/10.1145\/3768292.3770393","relation":{},"subject":[],"published":{"date-parts":[[2025,11,14]]},"assertion":[{"value":"2025-11-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}