{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:49:00Z","timestamp":1761598140249,"version":"build-2065373602"},"reference-count":57,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T00:00:00Z","timestamp":1574640000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100012554","name":"Hubei Provincial Department of Education","doi-asserted-by":"publisher","award":["Q20171208","Talent Excellence Program 2018"],"award-info":[{"award-number":["Q20171208","Talent Excellence Program 2018"]}],"id":[{"id":"10.13039\/100012554","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>Illegal insider trading identification presents a challenging task that attracts great interest from researchers due to the serious harm of insider trading activities to the investors\u2019 confidence and the sustainable development of security markets. In this study, we proposed an identification approach which integrates XGboost (eXtreme Gradient Boosting) and NSGA-II (Non-dominated Sorting Genetic Algorithm II) for insider trading regulation. First, the insider trading cases that occurred in the Chinese security market were automatically derived, and their relevant indicators were calculated and obtained. Then, the proposed method trained the XGboost model and it employed the NSGA-II for optimizing the parameters of XGboost by using multiple objective functions. Finally, the testing samples were identified using the XGboost with optimized parameters. Its performances were empirically measured by both identification accuracy and efficiency over multiple time window lengths. Results of experiments showed that the proposed approach successfully achieved the best accuracy under the time window length of 90-days, demonstrating that relevant features calculated within the 90-days time window length could be extremely beneficial for insider trading regulation. Additionally, the proposed approach outperformed all benchmark methods in terms of both identification accuracy and efficiency, indicating that it could be used as an alternative approach for insider trading regulation in the Chinese security market. The proposed approach and results in this research is of great significance for market regulators to improve their supervision efficiency and accuracy on illegal insider trading identification.<\/jats:p>","DOI":"10.3390\/info10120367","type":"journal-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T11:12:21Z","timestamp":1574680341000},"page":"367","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Identification of Insider Trading Using Extreme Gradient Boosting and Multi-Objective Optimization"],"prefix":"10.3390","volume":"10","author":[{"given":"Shangkun","family":"Deng","sequence":"first","affiliation":[{"name":"College of Economics and Management, China Three Gorges University, Yichang 443002, China"},{"name":"Financial Research Institute, College of Economics and Management, China Three Gorges University, Yichang 443002, China"}]},{"given":"Chenguang","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Economics and Management, China Three Gorges University, Yichang 443002, China"}]},{"given":"Jie","family":"Li","sequence":"additional","affiliation":[{"name":"College of Economics and Management, China Three Gorges University, Yichang 443002, China"}]},{"given":"Haoran","family":"Yu","sequence":"additional","affiliation":[{"name":"College of Economics and Management, China Three Gorges University, Yichang 443002, China"}]},{"given":"Hongyu","family":"Tian","sequence":"additional","affiliation":[{"name":"College of Economics and Management, China Three Gorges University, Yichang 443002, China"},{"name":"Financial Research Institute, College of Economics and Management, China Three Gorges University, Yichang 443002, China"}]},{"given":"Yu","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Economics and Management, China Three Gorges University, Yichang 443002, China"}]},{"given":"Yong","family":"Cui","sequence":"additional","affiliation":[{"name":"College of Economics and Management, China Three Gorges University, Yichang 443002, China"}]},{"given":"Fangjie","family":"Ma","sequence":"additional","affiliation":[{"name":"College of Science and Technology of China Three Gorges University, Yichang 443002, China"}]},{"given":"Tianxiang","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Creative Science &amp; Engineering, Waseda University, Tokyo 169-8555, Japan"}]}],"member":"1968","published-online":{"date-parts":[[2019,11,25]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1016\/j.chieco.2008.01.002","article-title":"Does corporate governance matter in china?","volume":"19","author":"Cheung","year":"2008","journal-title":"China Econ. Rev."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"955","DOI":"10.5131\/AJCL.2012.0011","article-title":"Enforcement without Foundation?\u2014Insider Trading and China\u2019s Administrative Law Crisis","volume":"60","author":"Howson","year":"2012","journal-title":"Am. J. Comp. Law"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1023\/A:1009755324212","article-title":"The Effect of Illegal Insider Trading on Takeover Premia","volume":"1","author":"Meulbroek","year":"2015","journal-title":"Rev. Financ."},{"key":"ref_4","unstructured":"(2019, October 01). Website of CSRC, Available online: http:\/\/www.csrc.gov.cn\/pub\/newsite\/."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Islam, S.R., Ghafoor, S.K., and Eberle, W. (2018, January 10\u201313). Mining Illegal Insider Trading of Stocks: A Proactive Approach. Proceedings of the IEEE International Conference on Big Data (Big Data), Seattle, WA, USA.","DOI":"10.1109\/BigData.2018.8622303"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/S0169-2070(97)00044-7","article-title":"Forecasting with artificial neural networks: The state of the art","volume":"14","author":"Zhang","year":"1998","journal-title":"Int. J. Forecast."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Vapnik, V.N. (1995). The Nature of Statistical Learning Theory, Springer.","DOI":"10.1007\/978-1-4757-2440-0"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1023\/A:1013912006537","article-title":"Logistic Regression, AdaBoost and Bregman Distances","volume":"48","author":"Collins","year":"2002","journal-title":"Mach. Learn."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Farooq, M., Zheng, H., Nagabhushana, A., Roy, S., Burkett, S., Barkey, M., Kotru, S., and Sazonov, E. (2012, January 30). Damage Detection and Identification in Smart Structures using SVM and ANN. Proceedings of the Smart Sensor Phenomena, Technology, Networks, & Systems Integration, San Diego, CA, USA.","DOI":"10.1117\/12.915189"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.compstruc.2007.05.034","article-title":"Damage identification for beams using ANN based on statistical property of structural responses","volume":"86","author":"Li","year":"2008","journal-title":"Comput. Struct."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Stoica, M., Calangiu, G.A., Sisak, F., and Sarkany, I. (2010, January 20\u201322). A method proposed for training an artificial neural network used for industrial robot programming by demonstration. Proceedings of the International Conference on Optimization of Electrical & Electronic Equipment, Basov, Romania.","DOI":"10.1109\/OPTIM.2010.5510463"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Das, A.B., Bhuiyan, M.I.H., and Alam, S.M.S. (2014, January 23\u201324). A statistical method for automatic detection of seizure and epilepsy in the dual tree complex wavelet transform domain. Proceedings of the International Conference on Informatics, Dhaka, Bangladesh.","DOI":"10.1109\/ICIEV.2014.6850758"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1016\/j.jhydrol.2009.09.029","article-title":"Comparison of two different data-driven techniques in modeling lake level fluctuations in Turkey","volume":"378","author":"KiSi","year":"2009","journal-title":"J. Hydrol."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Sun, H., and Xie, L. (2009, January 24\u201326). Recognition of a Sucker Rod\u2019s Defect with ANN and SVM. Proceedings of the International Joint Conference on Computational Sciences and Optimization, Sanya, China.","DOI":"10.1109\/CSO.2009.359"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"7203","DOI":"10.1016\/j.eswa.2013.07.028","article-title":"SVM-based posture identification with a single waist-located triaxial accelerometer","volume":"40","author":"Cabestany","year":"2013","journal-title":"Expert Syst. Appl."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Jiang, H., Tang, F., and Zhang, X. (2011, January 7\u201310). Liver cancer identification based on PSO-SVM model. Proceedings of the International Conference on Control Automation Robotics & Vision, Singapore.","DOI":"10.1109\/ICARCV.2010.5707396"},{"key":"ref_17","first-page":"23","article-title":"The SVM approach for Box\u2013Jenkins Models","volume":"7","author":"Amiri","year":"2011","journal-title":"Revstat-Stat. J."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1016\/j.patcog.2009.08.011","article-title":"Fingerprint classification based on Adaboost learning from singularity features","volume":"43","author":"Liu","year":"2010","journal-title":"Pattern Recogn."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Kim, D., and Philen, M. (2011, January 14). Damage classification using Adaboost machine learning for structural health monitoring. Proceedings of the Sensors and Smart Structures Technologies for Civil, Mechanical, and Aerospace Systems, San Diego, CA, USA.","DOI":"10.1117\/12.882016"},{"key":"ref_20","unstructured":"Romero, L.M. (2013). AdaBoost Classification to Detect Sleep Apnea from Airflow Recordings. XIII Mediterranean Conference on Medical & Biological Engineering & Computing, Springer."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Liu, X., Dai, Y., Zhang, Y., Yuan, Q., and Zhao, L. (2017, January 28\u201330). A preprocessing method of AdaBoost for mislabeled data classification. Proceedings of the 29th Chinese Control and Decision Conference (CCDC), Chongqing, China.","DOI":"10.1109\/CCDC.2017.7978978"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Mach. Learn."},{"key":"ref_23","first-page":"70","article-title":"Identification of Insider Trading in Security Market Based on Random Forests","volume":"41","author":"Deng","year":"2019","journal-title":"J. China Three Gorges Univ. Humanit. Soc. Sci."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/s10916-019-1400-8","article-title":"Detection of Skin Cancer Using SVM, Random Forest and KNN Classifiers","volume":"43","author":"Murugan","year":"2019","journal-title":"J. Med. Syst."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/s12541-019-00048-6","article-title":"Data-Driven Materials Modeling with XGBoost Algorithm and Statistical Inference Analysis for Prediction of Fatigue Strength of Steels","volume":"20","author":"Choi","year":"2019","journal-title":"Int. J. Precis. Eng. Manuf."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Nishio, M., Nishizawa, M., Sugiyama, O., Kojima, R., Yakami, M., Kuroda, T., and Togashi, K. (2017). Computer-aided diagnosis of lung nodule using gradient tree boosting and Bayesian optimization. PLoS ONE, 13.","DOI":"10.1371\/journal.pone.0195875"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Mustapha, I.B., and Saeed, F. (2016). Bioactive Molecule Prediction Using Extreme Gradient Boosting. Molecules, 21.","DOI":"10.3390\/molecules21080983"},{"key":"ref_28","first-page":"23","article-title":"The Improvement and Application of Xgboost Method Based on the Bayesian Optimization","volume":"35","author":"Li","year":"2018","journal-title":"J. Guangdong Univ. Technol."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Tamimi, A., Naidu, D.S., and Kavianpour, S. (2016, January 29\u201331). An Intrusion Detection System Based on NSGA-II Algorithm. Proceedings of the Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec), Jakarta, Indonesia.","DOI":"10.1109\/CyberSec.2015.20"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"568","DOI":"10.1016\/j.jsv.2018.01.047","article-title":"Structural damage detection-oriented multi-type sensor placement with multi-objective optimization","volume":"422","author":"Lin","year":"2018","journal-title":"J. Sound Vib."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Guan, X.Z. (2009, January 7\u20138). Multi-objective PID Controller Based on NSGA-II Algorithm with Application to Main Steam Temperature Control. Proceedings of the International Conference on Artificial Intelligence & Computational Intelligence, Shanghai, China.","DOI":"10.1109\/AICI.2009.388"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"946101","DOI":"10.1155\/2019\/9461018","article-title":"Particle Swarm Optimization for Positioning the Coil of Transcranial Magnetic Stimulation","volume":"2019","author":"Li","year":"2019","journal-title":"BioMed Res. Int."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1016\/j.ins.2018.11.041","article-title":"A hybrid GSA-GA algorithm for constrained optimization problems","volume":"478","author":"Garg","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_34","first-page":"292","article-title":"A hybrid PSO-GA algorithm for constrained optimization problems","volume":"274","author":"Garg","year":"2016","journal-title":"Appl. Math. Comput."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Alarifi, I.M., Nguyen, H.M., Bakhtiyari, A.N., and Asadi, A. (2019). Feasibility of ANFIS-PSO and ANFIS-GA Models in Predicting Thermophysical Properties of Al2O3-MWCNT\/Oil Hybrid Nanofluid. Materials, 12.","DOI":"10.3390\/ma12213628"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.jbankfin.2016.11.027","article-title":"Insider trading, stock return volatility, and the option market\u2019s pricing of the information content of insider trading","volume":"76","author":"Chiang","year":"2017","journal-title":"J. Bank. Financ."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/S1062-9769(01)00113-2","article-title":"Effects of insider trading under different market structures","volume":"42","author":"Jain","year":"2004","journal-title":"Q. Rev. Econ. Financ."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/S1057-5219(99)00026-5","article-title":"Pre-bid price run-ups and insider trading activity: Evidence from Canadian acquisitions","volume":"9","author":"Jabbour","year":"2004","journal-title":"Int. Rev. Financ. Anal."},{"key":"ref_39","first-page":"235","article-title":"Corporate governance and insider trading","volume":"40","author":"Dai","year":"2013","journal-title":"SSRN Electron. J."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1080\/1351847X.2018.1487312","article-title":"Insider trading and future stock returns in firms with concentrated ownership levels","volume":"25","author":"Chronopoulos","year":"2018","journal-title":"Eur. J. Financ."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Lu, C., Zhao, X., and Dai, J. (2018). Corporate Social Responsibility and Insider Trading: Evidence from China. Sustainability, 10.","DOI":"10.3390\/su10093163"},{"key":"ref_42","unstructured":"Chen, T., and He, T. (2019, November 24). XGBoost: eXtreme Gradient Boosting, R package version 04-2,. Available online: https:\/\/cran.r-project.org\/src\/contrib\/Archive\/xgboost\/."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"1189","DOI":"10.1214\/aos\/1013203451","article-title":"Greedy Function Approximation: A Gradient Boosting Machine","volume":"29","author":"Friedman","year":"2001","journal-title":"Ann. Stat."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1016\/S0167-9473(01)00065-2","article-title":"Stochastic gradient boosting","volume":"38","author":"Friedman","year":"2002","journal-title":"Comput. Stat. Data Anal."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1109\/4235.996017","article-title":"A fast and elitist multiobjective genetic algorithm: NSGA-II","volume":"6","author":"Deb","year":"2002","journal-title":"IEEE Trans. Evol. Comput."},{"key":"ref_46","unstructured":"Goldberg, D.E. (1989). Genetic Algorithms in Search, Optimization, and Machine Learning, Addison-Wesley."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Nebro, A.J., Durillo, J.J., Mach\u00edn, M., Coello, C.A.C., Dorronsoro, B.A.J., and Dorronsoro, B. (2013). A Study of the Combination of Variation Operators in the NSGA-II Algorithm. Advances in Artificial Intelligence, Springer.","DOI":"10.1007\/978-3-642-40643-0_28"},{"key":"ref_48","unstructured":"(2019, October 01). CSMAR Database. Available online: http:\/\/www.gtafe.com\/WebShow\/ShowDataService\/1."},{"key":"ref_49","unstructured":"(2019, October 01). RESSET Database. Available online: http:\/\/www.resset.cn\/databases."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Kalarani, P., and Brunda, S.S. (2016, January 24). An efficient approach for ensemble of SVM and ANN for sentiment classification. Proceedings of the 2016 IEEE International Conference on Advances in Computer Applications (ICACA), Coimbatore, India.","DOI":"10.1109\/ICACA.2016.7887931"},{"key":"ref_51","unstructured":"Ramaswamy, P.C., and Deconinck, G. (2012, January 14\u201317). Smart grid reconfiguration using simple genetic algorithm and NSGA-II. Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe), Berlin, Germany."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.energy.2017.02.073","article-title":"Single and multiple objective optimization of a natural gas liquefaction process","volume":"124","author":"Song","year":"2017","journal-title":"Energy"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Eisinga, R., Heskes, T., Pelzer, B., and Grotenhuis, M.T. (2017). Exact p-values for pairwise comparison of friedman rank sums, with application to comparing classifiers. BMC Bioinform., 18.","DOI":"10.1186\/s12859-017-1486-2"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"1661","DOI":"10.1111\/j.1540-6261.1992.tb04679.x","article-title":"An Empirical Analysis of Illegal Insider Trading","volume":"47","author":"Meulbroek","year":"1992","journal-title":"J. Financ."},{"key":"ref_55","unstructured":"Reynolds, J. (2010). Insider trading activities around the world: A case study in East Asia. Res. J. Financ. Account., 1."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"627","DOI":"10.11118\/actaun201664020627","article-title":"Prediction of Bankruptcy with SVM Classifiers Among Retail Business Companies in EU","volume":"64","author":"Hampel","year":"2016","journal-title":"Acta Univ. Agric. Silvic. Mendel. Brun."},{"key":"ref_57","unstructured":"Liu, K., and Yu, T. (2011, January 5\u20136). An Improved Support-Vector Network Model for Anti-Money Laundering. Proceedings of the Fifth International Conference on Management of E-commerce & E-government, Wuhan, China."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/10\/12\/367\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:37:21Z","timestamp":1760189841000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/10\/12\/367"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,25]]},"references-count":57,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2019,12]]}},"alternative-id":["info10120367"],"URL":"https:\/\/doi.org\/10.3390\/info10120367","relation":{},"ISSN":["2078-2489"],"issn-type":[{"type":"electronic","value":"2078-2489"}],"subject":[],"published":{"date-parts":[[2019,11,25]]}}}