false

Wealth or Stealth? The Camouflage Effect in Insider Trading

Wealth or Stealth? The Camouflage Effect in Insider Trading ArXiv ID: 2512.06309 “View on arXiv” Authors: Jin Ma, Weixuan Xia, Jianfeng Zhang Abstract We consider a Kyle-type model where insider trading takes place among a potentially large population of liquidity traders and is subject to legal penalties. Insiders exploit the liquidity provided by the trading masses to “camouflage” their actions and balance expected wealth with the necessary stealth to avoid detection. Under a diverse spectrum of prosecution schemes, we establish the existence of equilibria for arbitrary population sizes and a unique limiting equilibrium. A convergence analysis determines the scale of insider trading by a stealth index $γ$, revealing that the equilibrium can be closely approximated by a simple limit due to diminished price informativeness. Empirical aspects are derived from two calibration experiments using non-overlapping data sets spanning from 1980 to 2018, which underline the indispensable role of a large population in insider trading models with legal risk, along with important implications for the incidence of stealth trading and the deterrent effect of legal enforcement. ...

December 6, 2025 · 2 min · Research Team

An extreme Gradient Boosting (XGBoost) Trees approach to Detect and Identify Unlawful Insider Trading (UIT) Transactions

An extreme Gradient Boosting (XGBoost) Trees approach to Detect and Identify Unlawful Insider Trading (UIT) Transactions ArXiv ID: 2511.08306 “View on arXiv” Authors: Krishna Neupane, Igor Griva Abstract Corporate insiders have control of material non-public preferential information (MNPI). Occasionally, the insiders strategically bypass legal and regulatory safeguards to exploit MNPI in their execution of securities trading. Due to a large volume of transactions a detection of unlawful insider trading becomes an arduous task for humans to examine and identify underlying patterns from the insider’s behavior. On the other hand, innovative machine learning architectures have shown promising results for analyzing large-scale and complex data with hidden patterns. One such popular technique is eXtreme Gradient Boosting (XGBoost), the state-of-the-arts supervised classifier. We, hence, resort to and apply XGBoost to alleviate challenges of identification and detection of unlawful activities. The results demonstrate that XGBoost can identify unlawful transactions with a high accuracy of 97 percent and can provide ranking of the features that play the most important role in detecting fraudulent activities. ...

November 11, 2025 · 2 min · Research Team

A New Approach for the Continuous Time Kyle-Back Strategic Insider Equilibrium Problem

A New Approach for the Continuous Time Kyle-Back Strategic Insider Equilibrium Problem ArXiv ID: 2506.12281 “View on arXiv” Authors: Bixing Qiao, Jianfeng Zhang Abstract This paper considers a continuous time Kyle-Back model which is a game problem between an insider and a market marker. The existing literature typically focuses on the existence of equilibrium by using the PDE approach, which requires certain Markovian structure and the equilibrium is in the bridge form. We shall provide a new approach which is used widely for stochastic controls and stochastic differential games. We characterize all equilibria through a coupled system of forward backward SDEs, where the forward one is the conditional law of the inside information and the backward one is the insider’s optimal value. In particular, when the time duration is small, we show that the FBSDE is wellposed and thus the game has a unique equilibrium. This is the first uniqueness result in the literature, without restricting the equilibria to certain special structure. Moreover, this unique equilibrium may not be Markovian, indicating that the PDE approach cannot work in this case. We next study the set value of the game, which roughly speaking is the set of insider’s values over all equilibria and thus is by nature unique. We show that, although the bridge type of equilibria in the literature does not satisfy the required integrability for our equilibria, its truncation serves as a desired approximate equilibrium and its value belongs to our set value. Finally, we characterize our set value through a level set of certain standard HJB equation. ...

June 14, 2025 · 2 min · Research Team

Microstructure and Manipulation: Quantifying Pump-and-Dump Dynamics in Cryptocurrency Markets

Microstructure and Manipulation: Quantifying Pump-and-Dump Dynamics in Cryptocurrency Markets ArXiv ID: 2504.15790 “View on arXiv” Authors: Unknown Abstract Building on our prior threshold-based analysis of six months of Poloniex trading data, we have extended both the temporal span and granularity of our study by incorporating minute-level OHLCV records for 1021 tokens around each confirmed pump-and-dump event. First, we algorithmically identify the accumulation phase, marking the initial and final insider volume spikes, and observe that 70% of pre-event volume transacts within one hour of the pump announcement. Second, we compute conservative lower bounds on insider profits under both a single-point liquidation at 70% of peak and a tranche-based strategy (selling 20% at 50%, 30% at 60%, and 50% at 80% of peak), yielding median returns above 100% and upper-quartile returns exceeding 2000%. Third, by unfolding the full pump structure and integrating social-media verification (e.g., Telegram announcements), we confirm numerous additional events that eluded our initial model. We also categorize schemes into “pre-accumulation” versus “on-the-spot” archetypes-insights that sharpen detection algorithms, inform risk assessments, and underpin actionable strategies for real-time market-integrity enforcement. ...

April 22, 2025 · 2 min · Research Team

Corporate Fraud Detection in Rich-yet-Noisy Financial Graph

Corporate Fraud Detection in Rich-yet-Noisy Financial Graph ArXiv ID: 2502.19305 “View on arXiv” Authors: Unknown Abstract Corporate fraud detection aims to automatically recognize companies that conduct wrongful activities such as fraudulent financial statements or illegal insider trading. Previous learning-based methods fail to effectively integrate rich interactions in the company network. To close this gap, we collect 18-year financial records in China to form three graph datasets with fraud labels. We analyze the characteristics of the financial graphs, highlighting two pronounced issues: (1) information overload: the dominance of (noisy) non-company nodes over company nodes hinders the message-passing process in Graph Convolution Networks (GCN); and (2) hidden fraud: there exists a large percentage of possible undetected violations in the collected data. The hidden fraud problem will introduce noisy labels in the training dataset and compromise fraud detection results. To handle such challenges, we propose a novel graph-based method, namely, Knowledge-enhanced GCN with Robust Two-stage Learning (${"\rm KeGCN"}{“R”}$), which leverages Knowledge Graph Embeddings to mitigate the information overload and effectively learns rich representations. The proposed model adopts a two-stage learning method to enhance robustness against hidden frauds. Extensive experimental results not only confirm the importance of interactions but also show the superiority of ${"\rm KeGCN"}{“R”}$ over a number of strong baselines in terms of fraud detection effectiveness and robustness. ...

February 26, 2025 · 2 min · Research Team

Strategic Informed Trading and the Value of Private Information

Strategic Informed Trading and the Value of Private Information ArXiv ID: 2404.08757 “View on arXiv” Authors: Unknown Abstract We consider a market of risky financial assets whose participants are an informed trader, a representative uninformed trader, and noisy liquidity providers. We prove the existence of a market-clearing equilibrium when the insider internalizes her power to impact prices, but the uninformed trader takes prices as given. Compared to the associated competitive economy, in equilibrium the insider strategically reveals a noisier signal, and prices are less reactive to publicly available information. Additionally, and in direct contrast to the related literature, in equilibrium the insider’s indirect utility monotonically increases in the signal precision. Therefore, the insider is motivated not only to obtain, but also to refine, her signal. Lastly, we show that compared to the competitive economy, the insider’s internalization of price impact is utility improving for the uninformed trader, but somewhat surprisingly may be utility decreasing for the insider herself. This utility reduction occurs provided the insider is sufficiently risk averse compared to the uninformed trader, and provided the signal is of sufficiently low quality. ...

April 12, 2024 · 2 min · Research Team

Dimensionality reduction techniques to support insider trading detection

Dimensionality reduction techniques to support insider trading detection ArXiv ID: 2403.00707 “View on arXiv” Authors: Unknown Abstract Identification of market abuse is an extremely complicated activity that requires the analysis of large and complex datasets. We propose an unsupervised machine learning method for contextual anomaly detection, which allows to support market surveillance aimed at identifying potential insider trading activities. This method lies in the reconstruction-based paradigm and employs principal component analysis and autoencoders as dimensionality reduction techniques. The only input of this method is the trading position of each investor active on the asset for which we have a price sensitive event (PSE). After determining reconstruction errors related to the trading profiles, several conditions are imposed in order to identify investors whose behavior could be suspicious of insider trading related to the PSE. As a case study, we apply our method to investor resolved data of Italian stocks around takeover bids. ...

March 1, 2024 · 2 min · Research Team

Insider trading in discrete time Kyle games

Insider trading in discrete time Kyle games ArXiv ID: 2312.00904 “View on arXiv” Authors: Unknown Abstract We present a new discrete time version of Kyle’s (1985) classic model of insider trading, formulated as a generalised extensive form game. The model has three kinds of traders: an insider, random noise traders, and a market maker. The insider aims to exploit her informational advantage and maximise expected profits while the market maker observes the total order flow and sets prices accordingly. First, we show how the multi-period model with finitely many pure strategies can be reduced to a (static) social system in the sense of Debreu (1952) and prove the existence of a sequential Kyle equilibrium, following Kreps and Wilson (1982). This works for any probability distribution with finite support of the noise trader’s demand and the true value, and for any finite information flow of the insider. In contrast to Kyle (1985) with normal distributions, equilibria exist in general only in mixed strategies and not in pure strategies. In the single-period model we establish bounds for the insider’s strategy in equilibrium. Finally, we prove the existence of an equilibrium for the game with a continuum of actions, by considering an approximating sequence of games with finitely many actions. Because of the lack of compactness of the set of measurable price functions, standard infinite-dimensional fixed point theorems are not applicable. ...

December 1, 2023 · 2 min · Research Team