<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3-mathml3.dtd">
<article article-type="research-article" dtd-version="1.3" xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Phys.</journal-id>
<journal-title-group>
<journal-title>Frontiers in Physics</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Phys.</abbrev-journal-title>
</journal-title-group>
<issn pub-type="epub">2296-424X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">1733200</article-id>
<article-id pub-id-type="doi">10.3389/fphy.2025.1733200</article-id>
<article-version article-version-type="Version of Record" vocab="NISO-RP-8-2008"/>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Original Research</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Simulation of high-frequency trading risks and regulatory strategies in China&#x2019;s financial market based on multi-layer complex networks</article-title>
<alt-title alt-title-type="left-running-head">Jian et al.</alt-title>
<alt-title alt-title-type="right-running-head">
<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3389/fphy.2025.1733200">10.3389/fphy.2025.1733200</ext-link>
</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Jian</surname>
<given-names>Xiao</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<uri xlink:href="https://loop.frontiersin.org/people/2757083"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing - original draft</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Formal analysis" vocab-term-identifier="https://credit.niso.org/contributor-roles/formal-analysis/">Formal Analysis</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Software" vocab-term-identifier="https://credit.niso.org/contributor-roles/software/">Software</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Investigation" vocab-term-identifier="https://credit.niso.org/contributor-roles/investigation/">Investigation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x26; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/">Writing - review and editing</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Yin</surname>
<given-names>Zhilin</given-names>
</name>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Conceptualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/conceptualization/">Conceptualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x26; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/">Writing - review and editing</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Formal analysis" vocab-term-identifier="https://credit.niso.org/contributor-roles/formal-analysis/">Formal Analysis</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing - original draft</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Investigation" vocab-term-identifier="https://credit.niso.org/contributor-roles/investigation/">Investigation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Validation" vocab-term-identifier="https://credit.niso.org/contributor-roles/validation/">Validation</role>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Li</surname>
<given-names>Hao</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
<xref ref-type="fn" rid="fn1">
<sup>&#x2020;</sup>
</xref>
<uri xlink:href="https://loop.frontiersin.org/people/3157848"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Methodology" vocab-term-identifier="https://credit.niso.org/contributor-roles/methodology/">Methodology</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Formal analysis" vocab-term-identifier="https://credit.niso.org/contributor-roles/formal-analysis/">Formal Analysis</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Visualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/visualization/">Visualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Resources" vocab-term-identifier="https://credit.niso.org/contributor-roles/resources/">Resources</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing - original draft</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Investigation" vocab-term-identifier="https://credit.niso.org/contributor-roles/investigation/">Investigation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x26; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/">Writing - review and editing</role>
</contrib>
</contrib-group>
<aff id="aff1">
<label>1</label>
<institution>Law School, Zhongnan University of Economics and Law</institution>, <city>Wuhan</city>, <country country="CN">China</country>
</aff>
<aff id="aff2">
<label>2</label>
<institution>School of Statistics and Mathematics, Zhongnan University of Economics and Law</institution>, <city>Wuhan</city>, <country country="CN">China</country>
</aff>
<author-notes>
<corresp id="c001">
<label>&#x2a;</label>Correspondence: Hao Li, <email xlink:href="mailto:18503885520@163.com">18503885520@163.com</email>
</corresp>
<fn fn-type="present-address" id="fn1">
<label>&#x2020;</label>
<p>
<bold>Present address:</bold> Hao Li, Law School, Henan University of Economics and Law, Zhengzhou, China</p>
</fn>
</author-notes>
<pub-date publication-format="electronic" date-type="pub" iso-8601-date="2026-02-05">
<day>05</day>
<month>02</month>
<year>2026</year>
</pub-date>
<pub-date publication-format="electronic" date-type="collection">
<year>2025</year>
</pub-date>
<volume>13</volume>
<elocation-id>1733200</elocation-id>
<history>
<date date-type="received">
<day>27</day>
<month>10</month>
<year>2025</year>
</date>
<date date-type="rev-recd">
<day>05</day>
<month>12</month>
<year>2025</year>
</date>
<date date-type="accepted">
<day>26</day>
<month>12</month>
<year>2025</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#xa9; 2026 Jian, Yin and Li.</copyright-statement>
<copyright-year>2026</copyright-year>
<copyright-holder>Jian, Yin and Li</copyright-holder>
<license>
<ali:license_ref start_date="2026-02-05">https://creativecommons.org/licenses/by/4.0/</ali:license_ref>
<license-p>This is an open-access article distributed under the terms of the <ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution License (CC BY)</ext-link>. The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</license-p>
</license>
</permissions>
<abstract>
<p>This study addresses the dual structural characteristics of China&#x2019;s financial market&#x2014;namely, &#x201c;retail-investor dominance (80% of trading volume) versus foreign capital&#x2019;s technological monopoly (0.3% of institutions controlling 43.6% of order flow).&#x201d; By constructing a multi-layer complex network agent-based model (ABM) that integrates regulatory, core institutional, market-maker, and retail investor layers, it systematically simulates risk transmission mechanisms and regulatory strategies in high-frequency trading (HFT) environments. The findings reveal that HFT exacerbates market unfairness through technological latency advantages. When communication latency differentials exceed 50 milliseconds, retail order interception rates increase nonlinearly to 82%. Moreover, as the strategy homogenization coefficient &#x3c1; surpasses the critical threshold of 0.65, the market undergoes a percolation phase transition, with systemic risk probability jumping from 0.2 to over 0.7, which may trigger liquidity crises such as &#x201c;flash crashes.&#x201d; Traditional regulatory approaches, hindered by response delays averaging 2.1 h, struggle to cope with the real-time nature of HFT and the challenges posed by algorithmic black boxes. Based on the simulation results, policy recommendations centered on &#x201c;anti-technological-monopoly,&#x201d; &#x201c;real-time algorithmic resonance monitoring,&#x201d; and &#x201c;regulatory intelligence&#x201d; are proposed to develop a modernized and computationally executable regulatory framework tailored to China&#x2019;s market structure, thereby enhancing both market stability and fairness.</p>
</abstract>
<kwd-group>
<kwd>complex networks</kwd>
<kwd>financial markets</kwd>
<kwd>high-frequency trading</kwd>
<kwd>percolation theory</kwd>
<kwd>topological structure</kwd>
</kwd-group>
<funding-group>
<funding-statement>The author(s) declared that financial support was received for this work and/or its publication. This research is supported by the Law School and School of Statistics and Mathematics, Zhongnan University of Economics and Law.</funding-statement>
</funding-group>
<counts>
<fig-count count="6"/>
<table-count count="3"/>
<equation-count count="8"/>
<ref-count count="38"/>
<page-count count="00"/>
</counts>
<custom-meta-group>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Social Physics</meta-value>
</custom-meta>
</custom-meta-group>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="s1">
<label>1</label>
<title>Introduction</title>
<p>Currently, China&#x2019;s financial market is undergoing a critical period characterized by scale expansion, structural transformation, and technology-driven evolution. As the world&#x2019;s second-largest economy, China&#x2019;s capital market has developed into a pivotal hub connecting domestic and international capital, assets, and risks. In recent years, alongside market liberalization and the deep integration of financial technology, the scale of the A-share market has continued to expand, trading instruments have diversified, and investor structure has exhibited increasing heterogeneity. However, compared to mature markets, China&#x2019;s financial market retains distinct local characteristics, prominently manifested as a complex landscape of &#x201c;retail-investor dominance, policy sensitivity, and technological stratification.&#x201d; Statistics indicate that retail investors contribute approximately 80% of market trading volume, forming a crucial foundation for market liquidity, yet their trading behavior is prone to emotional influences and susceptible to &#x201c;herding effects&#x201d; [<xref ref-type="bibr" rid="B1">1</xref>]. Simultaneously, although foreign institutions account for an extremely low proportion in number (around 0.3%), they leverage significant advantages in algorithms, computational power, and network latency to control over 40% of order flow, creating a dual structure where &#x201c;technological monopoly&#x201d; coexists with &#x201c;retail dominance&#x201d; [<xref ref-type="bibr" rid="B2">2</xref>, <xref ref-type="bibr" rid="B3">3</xref>], a structural contradiction that poses severe challenges to the liquidity, stability, and fairness of China&#x2019;s financial market [<xref ref-type="bibr" rid="B4">4</xref>].</p>
<p>Against this backdrop, high-frequency trading, as a cutting-edge domain of financial technology development, is profoundly reshaping market microstructure and risk transmission pathways. Leveraging sophisticated algorithmic models, low-latency trading systems, and massive data processing capabilities, high-frequency trading enables the generation, execution, and cancellation of large volumes of orders at millisecond or even microsecond intervals. Globally, while high-frequency trading has historically played a positive role in enhancing market liquidity and facilitating price discovery, its potential risks cannot be overlooked, such as &#x201c;flash crashes&#x201d; induced by strategy homogenization, concerns over fairness arising from technological stratification, and regulatory blind spots due to algorithmic black boxes [<xref ref-type="bibr" rid="B1">1</xref>]. In China, alongside financial market liberalization and technological advancement, high-frequency trading, though relatively late to emerge, has developed rapidly and has become a critical tool for certain institutions&#x2014;particularly foreign ones&#x2014;to capture excess returns and influence order flow dynamics. Empirical evidence suggests that while high-frequency trading improves transactional efficiency, it also significantly alters the logic of risk generation and the velocity of risk propagation, rendering traditional financial risk control models&#x2014;based on historical data and static distributions&#x2014;inadequate for capturing its dynamic characteristics [<xref ref-type="bibr" rid="B2">2</xref>].</p>
<p>However, the existing regulatory system faces multiple challenges when addressing the novel risks introduced by high-frequency trading. First, technological asymmetry leads to regulatory lag. High-frequency trading relies on rapid algorithmic iteration and hardware advantages, allowing strategy adjustments within hours, whereas traditional regulation depends on manual review and rule-based frameworks, with an average response time exceeding 2 h, resulting in a significant &#x201c;speed disadvantage.&#x201d; Second, data silos and cross-border regulatory arbitrage undermine regulatory effectiveness. Some high-frequency institutions exploit barriers to cross-border data flows and regulatory differences to evade scrutiny; it is estimated that over 27% of high-frequency trading involves regulatory arbitrage [<xref ref-type="bibr" rid="B5">5</xref>, <xref ref-type="bibr" rid="B6">6</xref>]. Furthermore, strategy homogenization and algorithmic resonance have emerged as new catalysts for systemic risk. When a large number of market participants employ similar algorithms, localized disturbances can rapidly amplify into global liquidity crises through highly interconnected network nodes, as exemplified by past &#x201c;flash crash&#x201d; phenomena in the A-share market. These issues highlight the inadequacy of traditional regulatory tools in anticipating, identifying, and intervening in high-frequency trading risks, underscoring the urgent need for more sophisticated, dynamic, and computationally enabled risk simulation and regulatory approaches.</p>
<p>Therefore, to systematically analyze the unique risks of high-frequency trading in China&#x2019;s financial market and design corresponding regulatory tools, this study employs an agent-based modeling approach grounded in multi-layer complex networks to conduct dynamic simulations of high-frequency trading risks. The research aims to construct a multi-layer network model integrating &#x201c;policy intervention&#x2013;institutional behavior&#x2013;retail investor sentiment,&#x201d; utilizing topological structure modeling to reveal the structural basis of risk transmission, applying percolation phase transition theory to warn of critical thresholds for systemic risk, and exploring computable and executable regulatory policy compilation pathways. The main contributions of this study are: (1) First incorporating policy intervention nodes into multi-layer complex network models, overcoming the limitation of traditional financial contagion models that neglect policy intervention; (2) Quantifying the critical threshold of systemic risk through percolation phase transition theory, providing 3.2 h of early warning for regulation; (3) Designing computable regulatory tool compilation paths, transforming fair trading provisions into dynamic tax rates based on technological latency disparities, thereby facilitating the construction of a modern regulatory framework compatible with the high-frequency trading era and enhancing market efficiency while safeguarding financial stability and trading equity [<xref ref-type="bibr" rid="B7">7</xref>].</p>
</sec>
<sec id="s2">
<label>2</label>
<title>Data and research methodology</title>
<sec id="s2-1">
<label>2.1</label>
<title>Framework and initialization of an agent-based complex network model</title>
<sec id="s2-1-1">
<label>2.1.1</label>
<title>Model applicability</title>
<p>China&#x2019;s financial market exhibits a dual structure characterized by &#x201c;retail investor dominance (80% of trading volume) - foreign capital technological monopoly (0.3% of institutions controlling 43.6% of order flow)&#x201d;. Traditional models (e.g., VaR, GARCH) struggle to capture such asymmetric features due to their assumptions of homogeneous agents and static distributions [<xref ref-type="bibr" rid="B8">8</xref>, <xref ref-type="bibr" rid="B9">9</xref>]. Agent-based modeling (ABM) accurately replicates three localized risks through a hierarchical agent design (embedding an emotion contagion module in the retail investor layer, implanting parameters for technological latency disparities and strategy homogenization coefficients in the foreign capital layer, and setting policy transmission time delays in the regulatory layer) [<xref ref-type="bibr" rid="B6">6</xref>, <xref ref-type="bibr" rid="B10">10</xref>]: herding effects triggered by retail investor sentiment (e.g., a 47% sharp decline in order book thickness during the 2024 futures flash crash), order capture rates exceeding 82% due to technological stratification (consistent with Pagnotta&#x2019;s S-shaped curve) [<xref ref-type="bibr" rid="B11">11</xref>, <xref ref-type="bibr" rid="B12">12</xref>], and cross-border regulatory arbitrage (27% of high-frequency trading evading scrutiny) [<xref ref-type="bibr" rid="B13">13</xref>]. Compared to traditional methods (e.g., the failure of historical simulation in testing individual stocks on the Shenzhen Stock Exchange, GARCH models&#x27; inability to capture microstructural dynamics) [<xref ref-type="bibr" rid="B14">14</xref>], &#x201c;The ABM incorporates a millisecond-level order book protocol (with a 100 ms step size) to dynamically simulate processes such as strategy disguise (e.g., ID changes every 2.1 h) and liquidity collapse [<xref ref-type="bibr" rid="B15">15</xref>]. This allows the model to reproduce the risk transmission chain: when the strategy homogenization coefficient exceeds 0.65, the percolation probability P surges, leading to a market crash of approximately 9% within 5 min [<xref ref-type="bibr" rid="B11">11</xref>]. This capability addresses a significant limitation of international models, which exhibit prediction errors of up to 32% [<xref ref-type="bibr" rid="B14">14</xref>].&#x201d;</p>
</sec>
<sec id="s2-1-2">
<label>2.1.2</label>
<title>Necessity</title>
<p>Beyond its accuracy in replicating market phenomena, the application of this ABM complex network model is necessitated by pressing regulatory challenges and enable policy sandbox simulations. The governance of high-frequency risks in China requires simultaneously tackling algorithmic black boxes, data sovereignty barriers (Article 31 of the Data Security Law), and lagging policy tools (regulatory delays leading to a 58% increase in loss rates). The value of the complex network ABM model is demonstrated in three aspects: First, it quantifies risk thresholds using a percolation phase transition algorithm:<disp-formula id="equ1">
<mml:math id="m1">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3bb;</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>p</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:msub>
<mml:mi>k</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:msup>
<mml:mo>&#xb7;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mi>I</mml:mi>
<mml:mrow>
<mml:mi>s</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>n</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>n</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>I</mml:mi>
<mml:mrow>
<mml:mi>b</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>s</mml:mi>
<mml:mi>e</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
</disp-formula>where the risk probability P surges from 0.2 to 0.8 when the strategy homogenization coefficient exceeds 0.65, providing a 3.2-h earlier warning of flash crashes compared to traditional volatility models [<xref ref-type="bibr" rid="B11">11</xref>]. Second, it supports the compilation of regulatory rules into machine-executable formats, such as translating fair trading provisions into dynamic tax rates based on technological latency disparities (a 0.2% tax increase for every 50 ms delay) to tax technological hegemony [<xref ref-type="bibr" rid="B11">11</xref>], and encoding circuit breaker rules as exponential functions of aggregation coefficients to curb monopolies (triggering scrutiny when the aggregation coefficient exceeds 0.3) [<xref ref-type="bibr" rid="B11">11</xref>]. Third, it resolves data silos while ensuring compliance with both GDPR and the Data Security Law [<xref ref-type="bibr" rid="B16">16</xref>, <xref ref-type="bibr" rid="B17">17</xref>]. These functionalities make the ABM model a powerful tool for simulating the feedback loop between the regulatory and market layers, whereas traditional simulations fail to evaluate the effectiveness of regulatory interventions due to their neglect of policy intervention nodes.</p>
</sec>
</sec>
<sec id="s2-2">
<label>2.2</label>
<title>Construction of model network topology structure</title>
<p>Given the characteristic of &#x201c;strong policy intervention&#x201d; in China&#x2019;s financial market, constructing a four-layer network topology centered around &#x201c;regulatory nodes,&#x201d; as illustrated in <xref ref-type="fig" rid="F1">Figure 1</xref>, is essential for effectively simulating and modeling the dual-structure contradiction of &#x201c;retail-investor dominance (80% of trading volume) versus foreign capital technological monopoly.&#x201d; The theoretical foundation primarily integrates three types of literature: first, drawing on the core-periphery topology characteristics of scale-free networks [<xref ref-type="bibr" rid="B18">18</xref>], it accurately maps order flow monopoly phenomena through differentiated modeling of a few highly connected nodes (foreign institutions) and a vast number of low-connectivity nodes (retail investors); second, incorporating the vertical governance logic of hierarchical networks, it positions the regulatory layer as the top-level control node, overcoming the limitation of traditional financial contagion models that neglect policy intervention [<xref ref-type="bibr" rid="B19">19</xref>]; third, combining the fault-tolerant mechanism of ring topology with the spatial constraint rules of geometric random graphs [<xref ref-type="bibr" rid="B2">2</xref>], it addresses the compound challenges of cross-border data barriers (Article 31 of the Data Security Law) and physical latency disparities (<inline-formula id="inf1">
<mml:math id="m2">
<mml:mrow>
<mml:mo>&#x394;</mml:mo>
<mml:mi mathvariant="bold-italic">L</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> &#x3d; 50 ms).</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption>
<p>High-frequency trading market network topology diagram.</p>
</caption>
<graphic xlink:href="fphy-13-1733200-g001.tif">
<alt-text content-type="machine-generated">Flowchart showing four interconnected nodes: Regulatory Node A (orange), Core Node B (yellow), Sub-core Node C (blue), and Peripheral Node D (green). Arrows indicate directional flow between nodes.</alt-text>
</graphic>
</fig>
<p>This study constructs a four-layer complex network model including &#x27;regulatory layer, core institutional layer, market-maker layer, and retail investor layer&#x27;, where the regulatory layer is connected to the core institutional layer through policy transmission links, the core institutional layer is interconnected through strategy homogenization links and extends to the market-maker layer through order flow control links, and the market-maker layer is connected to the retail investor layer through latency advantage links, forming a complete closed-loop system.</p>
<sec id="s2-2-1">
<label>2.2.1</label>
<title>Dynamic monitoring mechanism of regulatory nodes</title>
<p>Based on the dynamic Granger causality analysis framework, regulatory nodes are equipped with real-time monitoring capabilities to detect changes in causal relationships among market nodes. The regulatory node employs an overlapping window method to segment market trading data, quantifying causal influence intensity between nodes through vector autoregressive models. The monitoring mechanism includes: preprocessing market trading data for stationarity to remove non-stationary biases; computing lagged cross-covariance sequences to establish VAR models; estimating coefficient matrices through Yule-Walker equations; and calculating conditional Granger causality values to identify key risk transmission paths.</p>
</sec>
<sec id="s2-2-2">
<label>2.2.2</label>
<title>Dynamic design of policy trigger mechanism</title>
<p>Drawing from the causality-driven node selection algorithm, regulatory nodes select optimal intervention timing based on dynamic causality graphs. Specific implementations include: calculating the out-degree of each market node to identify &#x27;driving hub&#x27; nodes with maximum causal influence; automatically triggering regulatory intervention when key nodes&#x27; causal out-degree exceeds preset thresholds; and adopting a segmented learning-execution strategy to periodically update the causality network, ensuring policy trigger mechanisms adapt to market structure changes.</p>
</sec>
<sec id="s2-2-3">
<label>2.2.3</label>
<title>Closed-loop design of feedback process</title>
<p>Adopting a local information-based pinning control strategy, the regulatory feedback mechanism is designed as follows: each regulatory node manages only a subset of market nodes within its causal influence domain; extracting feedback information based on local causal relationships and control influence regions; employing sign control functions to dynamically adjust control direction based on error states; and ensuring control coverage spans the entire market network, i.e., <inline-formula id="inf2">
<mml:math id="m3">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="normal">&#x3a9;</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>&#x222a;</mml:mo>
<mml:msub>
<mml:mi mathvariant="normal">&#x3a9;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>&#x222a;</mml:mo>
<mml:mo>.</mml:mo>
<mml:mo>.</mml:mo>
<mml:mo>.</mml:mo>
<mml:mo>&#x222a;</mml:mo>
<mml:msub>
<mml:mi mathvariant="normal">&#x3a9;</mml:mi>
<mml:mi>m</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mi mathvariant="normal">&#x3a9;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
</sec>
<sec id="s2-2-4">
<label>2.2.4</label>
<title>Network topology and regulatory closed loop</title>
<p>At the topological center, &#x201c;Regulatory Node A&#x201d; (orange dot) connects directly to &#x201c;Core Node B (foreign capital/licensed institutions)&#x201d; (yellow dot) via &#x201c;policy transmission&#x201d; links. Core Nodes B interconnect through internal cycles of &#x201c;strategy homogenization&#x201d; links and extend downward to &#x201c;Sub-core Node C (market makers)&#x201d; (blue dot) via &#x201c;order flow control&#x201d; links. Market makers further connect to the outermost &#x201c;Peripheral Nodes (retail investors)&#x201d; (green dot) through &#x201c;latency advantage&#x201d; links, while retail investors relay information back to Regulatory Node A via &#x201c;risk feedback&#x201d; links, forming a complete closed-loop system. The regulatory control input can be designed as:<disp-formula id="equ2">
<mml:math id="m4">
<mml:mrow>
<mml:msub>
<mml:mi>u</mml:mi>
<mml:mi>p</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>s</mml:mi>
<mml:mi>p</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mi>&#x1d63;</mml:mi>
<mml:mtext>&#x2009;</mml:mtext>
</mml:munderover>
<mml:mo>&#x2208;</mml:mo>
<mml:msub>
<mml:mi mathvariant="normal">&#x3a9;</mml:mi>
<mml:mi>p</mml:mi>
</mml:msub>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mi>h</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>e</mml:mi>
<mml:mi>&#x1d63;</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mi>&#x117;</mml:mi>
<mml:mi>&#x1d63;</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</disp-formula>where <inline-formula id="inf3">
<mml:math id="m5">
<mml:mrow>
<mml:msub>
<mml:mi>s</mml:mi>
<mml:mi>p</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is the control function related to error states, and <inline-formula id="inf4">
<mml:math id="m6">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="normal">&#x3a9;</mml:mi>
<mml:mi>p</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> represents the influence domain of the <italic>p</italic>th regulatory node [<xref ref-type="bibr" rid="B20">20</xref>, <xref ref-type="bibr" rid="B21">21</xref>].</p>
<p>Therefore, this diagram serves as an intuitive representation of the theoretical innovation of the model. Placing the &#x201c;regulatory node&#x201d; at the topological center constitutes a visual practice of Qian Xuesen&#x2019;s methodology of &#x201c;open complex giant systems&#x201d;, emphasizing that policy intervention is a key endogenous variable shaping market structure in the Chinese context. This design reflects the characteristic of &#x201c;strong policy intervention&#x201d; in China&#x2019;s financial market. The closed loop formed by &#x201c;policy transmission&#x201d; and &#x201c;risk feedback&#x201d; depicted in the figure accurately simulates the operational logic of regulatory cycles with Chinese characteristics&#x2014;policies are transmitted top-down, while market risks are fed back bottom-up. The &#x201c;strategy homogenization&#x201d; links among core nodes lay the groundwork for subsequent simulations of systemic risk. This topological structure forms the foundational framework for all subsequent dynamic evolution.</p>
</sec>
</sec>
<sec id="s2-3">
<label>2.3</label>
<title>Model parameter design</title>
<p>The model parameters in this study were designed across three dimensions&#x2014;fundamental network construction, driven behavioral evolution, and policy intervention&#x2014;to better align with the state of China&#x2019;s financial market, with a corresponding parameter comparison table provided from <xref ref-type="table" rid="T1">Tables 1</xref>&#x2013;<xref ref-type="table" rid="T3">3</xref>.</p>
<table-wrap id="T1" position="float">
<label>TABLE 1</label>
<caption>
<p>Structural parameters.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="center">Parameter</th>
<th align="center">Symbol</th>
<th align="center">Value</th>
<th align="center">Source/<break/>Basis</th>
<th align="center">Rationale for setting</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Total nodes</td>
<td align="left">
<inline-formula id="inf5">
<mml:math id="m7">
<mml:mrow>
<mml:mi mathvariant="normal">N</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>
</td>
<td align="left">100,000</td>
<td align="left">People&#x2019;s bank of China Website [<xref ref-type="bibr" rid="B22">22</xref>]</td>
<td align="left">Balances computational efficiency with market representativeness (1 node &#x2248; 150 million market capitalization) [<xref ref-type="bibr" rid="B23">23</xref>]</td>
</tr>
<tr>
<td align="left">Core node ratio</td>
<td align="left">
<inline-formula id="inf6">
<mml:math id="m8">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">&#x3c1;</mml:mi>
<mml:mi mathvariant="bold-italic">c</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>
</td>
<td align="left">0.3%</td>
<td align="left">China Securities Depository and clearing statistical yearbook [<xref ref-type="bibr" rid="B24">24</xref>]</td>
<td align="left">Reflects the technological dominance of foreign/institutional capital</td>
</tr>
<tr>
<td align="left">Periphery node ratio</td>
<td align="left">
<inline-formula id="inf7">
<mml:math id="m9">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">&#x3c1;</mml:mi>
<mml:mi mathvariant="bold-italic">e</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>
</td>
<td align="left">80%</td>
<td align="left">China statistical yearbook 2024 2024 [<xref ref-type="bibr" rid="B25">25</xref>]</td>
<td align="left">Maps the retail-investor dominated market structure</td>
</tr>
<tr>
<td align="left">Clustering coefficient threshold</td>
<td align="left">
<inline-formula id="inf8">
<mml:math id="m10">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">C</mml:mi>
<mml:mi mathvariant="bold-italic">t</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>
</td>
<td align="left">0.3</td>
<td align="left">Circuit breakers and the magnet effect: Empirical evidence from China&#x2019;s stock market. The quarterly journal of finance [<xref ref-type="bibr" rid="B26">26</xref>]</td>
<td align="left">&#x3e;0.3 triggers circuit breakers</td>
</tr>
<tr>
<td align="left">Policy implementation lag</td>
<td align="left">
<inline-formula id="inf9">
<mml:math id="m11">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">&#x3c4;</mml:mi>
<mml:mi mathvariant="bold-italic">p</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>
</td>
<td align="left">2.1 h</td>
<td align="left">China securities regulatory commission annual report [<xref ref-type="bibr" rid="B27">27</xref>]</td>
<td align="left">Quantifies regulatory response lag</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="T2" position="float">
<label>TABLE 2</label>
<caption>
<p>Dynamic parameters.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="center">Parameter</th>
<th align="center">Symbol</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Maximum latency differential</td>
<td align="left">
<inline-formula id="inf10">
<mml:math id="m12">
<mml:mrow>
<mml:mo>&#x394;</mml:mo>
<mml:msub>
<mml:mi mathvariant="bold-italic">L</mml:mi>
<mml:mi mathvariant="bold-italic">max</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>
</td>
</tr>
<tr>
<td align="left">Order cancellation circuit breaker threshold</td>
<td align="left">
<inline-formula id="inf11">
<mml:math id="m13">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">Q</mml:mi>
<mml:mi mathvariant="bold-italic">max</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>
</td>
</tr>
<tr>
<td align="left">Strategy homogeneity coefficient</td>
<td align="left">
<inline-formula id="inf12">
<mml:math id="m14">
<mml:mrow>
<mml:mi mathvariant="bold-italic">&#x3c1;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>
</td>
</tr>
<tr>
<td align="left">Percolation probability threshold</td>
<td align="left">
<inline-formula id="inf13">
<mml:math id="m15">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">P</mml:mi>
<mml:mi mathvariant="bold-italic">t</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>
</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="T3" position="float">
<label>TABLE 3</label>
<caption>
<p>Policy parameters.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Parameter</th>
<th align="left">Computational logic</th>
<th align="left">Legal mapping</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Sovereign compensation tax rate</td>
<td align="left">
<inline-formula id="inf14">
<mml:math id="m16">
<mml:mrow>
<mml:msub>
<mml:mi>T</mml:mi>
<mml:mi>a</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.2</mml:mn>
<mml:mo>&#xd7;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mo>&#x394;</mml:mo>
<mml:mi>L</mml:mi>
</mml:mrow>
<mml:mn>50</mml:mn>
</mml:mfrac>
</mml:mrow>
</mml:math>
</inline-formula>(<inline-formula id="inf15">
<mml:math id="m17">
<mml:mrow>
<mml:mo>&#x394;</mml:mo>
<mml:mi>L</mml:mi>
<mml:mo>&#x3e;</mml:mo>
<mml:mn>50</mml:mn>
<mml:mi>m</mml:mi>
<mml:mi>s</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>)</td>
<td align="left">Art. 10, consumer rights protection law<break/>Art. 22, anti-monopoly law</td>
</tr>
<tr>
<td align="left">Federated learning data availability</td>
<td align="left">
<inline-formula id="inf16">
<mml:math id="m18">
<mml:mrow>
<mml:msub>
<mml:mi>A</mml:mi>
<mml:mi>d</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>D</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>s</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>n</mml:mi>
<mml:mi>s</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>z</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>d</mml:mi>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mi>F</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>l</mml:mi>
<mml:mi>d</mml:mi>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mi>C</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>u</mml:mi>
<mml:mi>n</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mi>T</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>l</mml:mi>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mi>F</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>l</mml:mi>
<mml:mi>d</mml:mi>
<mml:mi>s</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x2265;</mml:mo>
<mml:mn>0.85</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>
</td>
<td align="left">Article 21 of the data security law<break/>Article 4 of the general data protection regulation (GDPR)</td>
</tr>
<tr>
<td align="left">Dynamic circuit breaker trigger conditions</td>
<td align="left">
<inline-formula id="inf17">
<mml:math id="m19">
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>f</mml:mi>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>C</mml:mi>
<mml:mo>&#x27e9;</mml:mo>
<mml:mn>0.3</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mo>&#x26;</mml:mo>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x27e9;</mml:mo>
<mml:mn>0.65</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>:</mml:mo>
<mml:msub>
<mml:mi>Q</mml:mi>
<mml:mi mathvariant="italic">max</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>300</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>
</td>
<td align="left">CSRC&#x2019;s &#x201c;guidelines for handling abnormal trading&#x201d;</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s2-4">
<label>2.4</label>
<title>Model initialization</title>
<sec id="s2-4-1">
<label>2.4.1</label>
<title>Market structure initialization</title>
<p>As illustrated in <xref ref-type="fig" rid="F2">Figure 2</xref>, the node distribution state after network initialization is presented. The figure should reveal a dense concentration of nodes representing &#x201c;retail investors,&#x201d; forming the foundational layer of the network; a smaller number of &#x201c;core nodes&#x201d; with numerous connections are scattered throughout, serving as network hubs, while &#x201c;market maker&#x201d; nodes occupy an intermediate position between the two. The annotated example nodes (ID: 235, Degree: 9) and (ID: 3326, Degree: 9) are two typical retail investor nodes.</p>
<fig id="F2" position="float">
<label>FIGURE 2</label>
<caption>
<p>Market structure initialization: Node type distribution.</p>
</caption>
<graphic xlink:href="fphy-13-1733200-g002.tif">
<alt-text content-type="machine-generated">Network graph with numerous interconnected nodes, primarily green and blue. Two nodes are highlighted: Node three thousand three hundred twenty-six and Node two hundred thirty-five, each with a degree of nine. The graph visualizes complex relationships among the nodes.</alt-text>
</graphic>
</fig>
<p>Therefore, this figure serves as a successful validation of the model&#x2019;s &#x201c;localization adaptation.&#x201d; The visualization results are highly consistent with the parameters set in <xref ref-type="table" rid="T1">Table 1</xref> (80% retail investors, 0.3% core nodes), demonstrating that the model initialization effectively generates a digital mirror of a &#x201c;retail investor-dominated market&#x201d; aligned with China&#x2019;s reality (as documented in the CSRC&#x2019;s White Paper on Investor Structure). Nodes 235 and 3326, each with a degree of 9, indicate that an average retail investor typically connects with 9 other nodes, whereas a core node may possess hundreds or thousands of connections. This visually corroborates the scale-free nature of the network, wherein a minority of nodes hold extensive linkages, providing a structural basis for rapid risk transmission through these hub nodes. The corresponding formula is expressed as below.<disp-formula id="equ3">
<mml:math id="m20">
<mml:mrow>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x223c;</mml:mo>
<mml:msup>
<mml:mi>k</mml:mi>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b3;</mml:mi>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:math>
</disp-formula>where k denotes the degree (number of connections) of a node or the scale of an event; P(k) represents the probability of an event having a scale k; and &#x3b3; is the power-law exponent, a constant greater than 0.</p>
</sec>
<sec id="s2-4-2">
<label>2.4.2</label>
<title>Strategic behavior initialization</title>
<p>At the moment of completing market structure initialization, we simultaneously introduce the Strategic Homogeneity Coefficient <inline-formula id="inf18">
<mml:math id="m21">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>, a core metric quantifying the degree of behavioral convergence among participants in financial markets. This coefficient fundamentally captures the similarity of trading strategies at the group level and the lack of diversity. Rooted in strategic convergence analysis from game theory and discrete choice theory, it reflects the gradual contraction of the strategy space toward local consensus when market participants act on limited information or similar decision-making frameworks (e.g., quantitative models) [<xref ref-type="bibr" rid="B28">28</xref>]. The coefficient is measured by calculating the variance or entropy of the strategy distribution: if participants widely adopt similar algorithms (such as trend-following or mean-reversion strategies), the coefficient approaches 1, indicating high homogeneity; if strategies exhibit a diverse distribution, the coefficient nears 0. In dynamic environments, strategic homogeneity is driven by the speed of information dissemination, technological constraints (e.g., algorithmic black boxes), and institutional factors (e.g., cross-border data barriers), collectively trapping participants in a &#x201c;minority game&#x201d; dilemma&#x2014;where the marginal benefit of deviating from mainstream strategies diminishes sharply, further reinforcing convergence [<xref ref-type="bibr" rid="B29">29</xref>].</p>
</sec>
</sec>
<sec id="s2-5">
<label>2.5</label>
<title>Risk transmission simulation</title>
<sec id="s2-5-1">
<label>2.5.1</label>
<title>Percolation theory</title>
<p>Percolation theory serves as a fundamental framework for studying critical phase transitions in disordered systems, initially proposed by Broadbent and Hammersley in 1957. Its core concept focuses on abrupt changes in long-range connectivity within random geometric structures. By simulating fluid flow behavior in porous media [<xref ref-type="bibr" rid="B18">18</xref>], this theory reveals that when system components (such as pore occupancy or bond connection probability) reach a critical threshold (the percolation threshold <inline-formula id="inf19">
<mml:math id="m22">
<mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mi>c</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>), the system undergoes a sharp phase transition from &#x201c;local connectivity&#x201d; to &#x201c;global percolation&#x201d; (or conversely, blockage). This transition fundamentally involves the emergence or disappearance of a percolating cluster in disordered media, manifesting as stepwise changes in conductivity, permeability, or risk contagivity [<xref ref-type="bibr" rid="B30">30</xref>].</p>
<p>In financial risk modeling, the core value of percolation theory lies in its critical threshold scaling laws and cluster dynamics. When the critical threshold <inline-formula id="inf20">
<mml:math id="m23">
<mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mi>c</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is mapped to the tipping point of systemic risk (e.g., when the strategy homogenization coefficient exceeds a certain value within its range), breaching this threshold allows minor local disturbances (such as a single institution&#x2019;s default) to trigger a global liquidity collapse through connected clusters, replicating the phase transition logic of<disp-formula id="equ4">
<mml:math id="m24">
<mml:mrow>
<mml:mtext>pore&#x2009;blockage&#x2009;</mml:mtext>
<mml:mo>&#x2192;</mml:mo>
<mml:mtext>&#x2009;fluid&#x2009;flow&#x2009;interruption</mml:mtext>
</mml:mrow>
</mml:math>
</disp-formula>
</p>
<p>The cluster formation mechanism, in turn, corresponds to the path of risk contagion: highly connected nodes in the core institutional layer (e.g., foreign market makers) act as hubs for risk transmission, with their betweenness centrality positively correlated with order capture rates. When strategy homogenization drives the connection probability <inline-formula id="inf21">
<mml:math id="m25">
<mml:mrow>
<mml:mi>p</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> between nodes toward <inline-formula id="inf22">
<mml:math id="m26">
<mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mi>c</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, sentiment factors in the retail investor layer accelerate risk diffusion within clusters, ultimately inducing a percolation phase transition.</p>
</sec>
<sec id="s2-5-2">
<label>2.5.2</label>
<title>Systemic risk contagion</title>
<p>As shown in <xref ref-type="fig" rid="F3">Figure 3</xref>&#x2010;<xref ref-type="fig" rid="F1">1</xref>, before risk propagation, the network nodes exhibit uniform coloration (e.g., all in blue) with a stable connection structure; after risk propagation, as depicted in <xref ref-type="fig" rid="F3">Figure 3</xref>&#x2010;<xref ref-type="fig" rid="F2">2</xref>, it is clearly observable that starting from a few &#x201c;core nodes&#x201d; with altered colors (e.g., turned red), the color change rapidly diffuses through connecting edges to &#x201c;market maker&#x201d; nodes (turning yellow), eventually affecting a large number of &#x201c;retail investor&#x201d; nodes (turning red), forming a chain reaction. Thus, <xref ref-type="fig" rid="F3">Figure 3</xref> serves as a vivid demonstration of the application of percolation theory in financial risk transmission and within this model. It intuitively reveals that the propagation of systemic risk is not uniform but rather proceeds along network connection paths, particularly through high-degree core hub nodes in a leap-like manner. This process also aligns with the logic described by the percolation theory formula, as presented below.<disp-formula id="equ5">
<mml:math id="m27">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3bb;</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>p</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:msub>
<mml:mi>k</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:msup>
</mml:mrow>
</mml:math>
</disp-formula>
</p>
<fig id="F3" position="float">
<label>FIGURE 3</label>
<caption>
<p>Visualization of sell-off propagation process.</p>
</caption>
<graphic xlink:href="fphy-13-1733200-g003.tif">
<alt-text content-type="machine-generated">Two network graphs depict risk propagation. The left graph, labeled &#x22;Before Risk Propagation,&#x22; shows a dense cluster of interconnected blue nodes. The right graph, labeled &#x22;After Risk Propagation,&#x22; features the same blue network with additional red nodes interspersed, indicating areas of risk impact.</alt-text>
</graphic>
</fig>
<p>Where <inline-formula id="inf23">
<mml:math id="m28">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3bb;</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> represents the probability of a certain event occurring (typically the probability of &#x201c;occurring at least once&#x201d;); <inline-formula id="inf24">
<mml:math id="m29">
<mml:mrow>
<mml:mi>p</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> denotes the probability of the event occurring in a single attempt (which remains constant), thus <inline-formula id="inf25">
<mml:math id="m30">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>p</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> is the probability of the event not occurring in a single attempt; and <inline-formula id="inf26">
<mml:math id="m31">
<mml:mrow>
<mml:msub>
<mml:mi>k</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> signifies the number of independent attempts. It follows that nodes with higher connectivity <inline-formula id="inf27">
<mml:math id="m32">
<mml:mrow>
<mml:msub>
<mml:mi>k</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> exhibit a greater probability <inline-formula id="inf28">
<mml:math id="m33">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3bb;</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> of transmitting and receiving risk [<xref ref-type="bibr" rid="B31">31</xref>, <xref ref-type="bibr" rid="B32">32</xref>].</p>
<p>Therefore, the introduction of percolation theory enables this study to transform the abstract concept of &#x201c;risk transmission&#x201d; into a visualizable &#x201c;digital pandemic&#x201d; [<xref ref-type="bibr" rid="B33">33</xref>], powerfully demonstrating why sell-offs by individual institutions can trigger panic across the entire market.</p>
</sec>
</sec>
</sec>
<sec id="s3">
<label>3</label>
<title>Result and analysis</title>
<sec id="s3-1">
<label>3.1</label>
<title>Analysis of high-frequency latency and retail order interception rate</title>
<p>By simulating the systemic disadvantages faced by retail investors under technological stratification, the model intuitively illustrates the issues of market power solidification and technological monopoly resulting from technical advantages. As shown in <xref ref-type="fig" rid="F4">Figure 4</xref>, the model employs an S-shaped growth function (Sigmoid function) to describe the relationship between interception probability and latency. This approach more accurately reflects the behavioral patterns of high-frequency trading algorithms in real markets compared to a simple linear model: even a slight latency advantage leads to a sharp increase in their ability to intercept orders. The formula is expressed as follows:<disp-formula id="equ6">
<mml:math id="m34">
<mml:mrow>
<mml:msub>
<mml:mi>P</mml:mi>
<mml:mtext>capture</mml:mtext>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>&#x3c4;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mn>1</mml:mn>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:msup>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>k</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>&#x3c4;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>&#x3c4;</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:math>
</disp-formula>
</p>
<fig id="F4" position="float">
<label>FIGURE 4</label>
<caption>
<p>Relationship between latency and retail order interception rate.</p>
</caption>
<graphic xlink:href="fphy-13-1733200-g004.tif">
<alt-text content-type="machine-generated">Line graph showing the relationship between latency in milliseconds on the x-axis and interception rate percentage on the y-axis. As latency increases from 0 to 50 ms, the interception rate increases steeply, reaching 82.3% at 50 ms, marked by a red dot and vertical dashed line. The curve flattens beyond this point, indicating a leveling off in interception rate.</alt-text>
</graphic>
</fig>
<p>Among them, <inline-formula id="inf29">
<mml:math id="m35">
<mml:mrow>
<mml:msub>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mi>c</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>p</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>u</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>e</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>&#x3c4;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> represents the probability of an order being successfully intercepted by high-frequency algorithms through &#x201c;front-running&#x201d;; <inline-formula id="inf30">
<mml:math id="m36">
<mml:mrow>
<mml:mi>&#x3c4;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> denotes the communication latency from the transmission of a trading instruction to its arrival at the exchange (unit: milliseconds, ms); <inline-formula id="inf31">
<mml:math id="m37">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3c4;</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the latency value that determines the center point of the S-curve, around which the interception probability undergoes a nonlinear surge; <inline-formula id="inf32">
<mml:math id="m38">
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> controls the steepness of the S-curve&#x2014;the larger the value of <inline-formula id="inf33">
<mml:math id="m39">
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>, the steeper the curve, and the faster the transition from low to high probability.</p>
<p>When the latency &#x3c4; exceeds the critical value &#x3c4;<sub>0</sub> &#x3d; 50 ms, the retail order interception rate <inline-formula id="inf34">
<mml:math id="m40">
<mml:mrow>
<mml:msub>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mi>c</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>p</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>u</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>e</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>&#x3c4;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> exhibits a nonlinear surge, exceeding 82%. This phenomenon validates the systemic trading inequity resulting from technological disadvantages, while also corroborating the high betweenness centrality (<inline-formula id="inf35">
<mml:math id="m41">
<mml:mrow>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mi>B</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3e;</mml:mo>
<mml:mn>0.6</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>) of core nodes. It reveals that the structural characteristic of &#x201c;technological oligopolization&#x201d; in China&#x2019;s financial market is further amplified in a high-frequency trading environment. Moreover, as latency increases, the solidification of market power driven by technological monopoly becomes more pronounced.</p>
</sec>
<sec id="s3-2">
<label>3.2</label>
<title>Strategic homogeneity and analysis of systemic financial risks</title>
<p>As high-frequency trading penetrates China&#x2019;s financial markets with its algorithmic advantages, flash crashes have become a Sword of Damocles looming over investors. The set of strategy choices among all market participants acts as the trigger for such events. To simulate flash crashes caused by algorithmic resonance, we map the degree of strategic homogeneity &#x3c1; to the connection probability within a network. When the strategic homogeneity &#x3c1; exceeds the critical threshold &#x3c1;_c, localized failures rapidly propagate across the system through similar algorithmic strategies, leading to liquidity evaporation and price collapse (i.e., percolation phase transition). The corresponding formulation is presented below:<disp-formula id="equ7">
<mml:math id="m42">
<mml:mrow>
<mml:msub>
<mml:mi>P</mml:mi>
<mml:mi>&#x221e;</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="{" close="" separators="&#x7c;">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:msub>
<mml:mi>&#x3c1;</mml:mi>
<mml:mi>c</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mfrac>
<mml:mn>1</mml:mn>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:msup>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>&#x3c1;</mml:mi>
<mml:mi>c</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x3e;</mml:mo>
<mml:msub>
<mml:mi>&#x3c1;</mml:mi>
<mml:mi>c</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</disp-formula>
</p>
<p>Among these, <inline-formula id="inf36">
<mml:math id="m43">
<mml:mrow>
<mml:msub>
<mml:mi>P</mml:mi>
<mml:mi>&#x221e;</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> represents the probability of systemic risk occurrence, <inline-formula id="inf37">
<mml:math id="m44">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3c1;</mml:mi>
<mml:mi>c</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> denotes the critical point, <inline-formula id="inf38">
<mml:math id="m45">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> indicates the similarity or convergence degree of all trading strategies in the market&#x2014;a higher <inline-formula id="inf39">
<mml:math id="m46">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> value implies that more institutions employ similar algorithmic strategies&#x2014;and <inline-formula id="inf40">
<mml:math id="m47">
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> controls the rate at which the risk probability increases beyond the critical point [<xref ref-type="bibr" rid="B34">34</xref>].</p>
<p>Following the simulation of the Chinese financial market environment using order book trading data accessed from the Hua Tai Securities INSIGHT Financial Data Service Documentation Center, as illustrated in <xref ref-type="fig" rid="F5">Figure 5</xref>, it can be observed that when the strategic homogeneity coefficient <inline-formula id="inf41">
<mml:math id="m48">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> exceeds the critical threshold of 0.65, the probability of systemic risk surges abruptly from a stable state. The system percolation probability P rapidly surpasses 0.7, indicating the market&#x2019;s entry into a high-risk state. As <inline-formula id="inf42">
<mml:math id="m49">
<mml:mrow>
<mml:msub>
<mml:mi>P</mml:mi>
<mml:mi>&#x221e;</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> approaches 1, localized risks propagate throughout the entire system, ultimately leading to a flash crash in the market. Consequently, the penetration of high-frequency trading further amplifies systemic risks within China&#x2019;s financial markets, which stem from homogeneous trading triggered by algorithmic resonance. Failure to promptly identify the degree of strategic homogeneity in the market will impede regulators&#x27; ability to avert market flash crashes triggered upon reaching the critical threshold [<xref ref-type="bibr" rid="B35">35</xref>].</p>
<fig id="F5" position="float">
<label>FIGURE 5</label>
<caption>
<p>Degree of strategy homogeneity and percolation probability.</p>
</caption>
<graphic xlink:href="fphy-13-1733200-g005.tif">
<alt-text content-type="machine-generated">Graph showing the relationship between percolation probability \( P \) and degree of strategy homogeneity \( \rho \). The curve rises steeply, with a marked red point at \( \rho &#x3d; 0.65 \) and \( P &#x3d; 0.72 \), indicating a threshold where significant increase occurs.</alt-text>
</graphic>
</fig>
</sec>
<sec id="s3-3">
<label>3.3</label>
<title>Analysis of regulatory latency and technology optimization benefits</title>
<p>High-frequency trading possesses significant technological and speed advantages compared to traditional trading methods, presenting a major challenge to regulators in China&#x2019;s financial markets [<xref ref-type="bibr" rid="B36">36</xref>]. During the initial phase of simulated risk emergence, shortening regulatory response time yields the greatest marginal benefit; however, once response time has been optimized to a relatively low level, further improvements exhibit diminishing returns. To quantitatively evaluate the intervention effectiveness of regulatory technology, this study constructs a logarithmic relationship model between regulatory response time and market loss rate, expressed as follows:<disp-formula id="equ8">
<mml:math id="m50">
<mml:mrow>
<mml:mi>L</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>L</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
<mml:mo>&#xb7;</mml:mo>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3b3;</mml:mi>
<mml:mo>&#xb7;</mml:mo>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>ln</mml:mi>
<mml:mfrac>
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>T</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</disp-formula>where <inline-formula id="inf43">
<mml:math id="m51">
<mml:mrow>
<mml:mi>L</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> represents the loss ratio suffered by retail investors under a regulatory response time <inline-formula id="inf44">
<mml:math id="m52">
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>; <inline-formula id="inf45">
<mml:math id="m53">
<mml:mrow>
<mml:mi>T</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> denotes the regulatory response time; <inline-formula id="inf46">
<mml:math id="m54">
<mml:mrow>
<mml:msub>
<mml:mi>L</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> indicates the inherent loss rate experienced by retail investors under the benchmark response time <inline-formula id="inf47">
<mml:math id="m55">
<mml:mrow>
<mml:msub>
<mml:mi>T</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>; <inline-formula id="inf48">
<mml:math id="m56">
<mml:mrow>
<mml:msub>
<mml:mi>T</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the benchmark response time; <inline-formula id="inf49">
<mml:math id="m57">
<mml:mrow>
<mml:mi>&#x3b3;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> is the loss elasticity coefficient, where a higher value of <inline-formula id="inf50">
<mml:math id="m58">
<mml:mrow>
<mml:mi>&#x3b3;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> implies that shortening the response time has a more significant marginal effect on reducing losses.</p>
<p>Based on historical cases in China&#x2019;s financial markets, the regulatory delay has been approximately 2.1 h. To verify the impact of high-frequency trading on traditional regulatory decision-making, an AI-based approval mechanism with faster response capabilities than manual processes was constructed, and the influence of regulatory response speed on retail investors was recorded. As shown in the comparative results between manual and AI-based approval in <xref ref-type="fig" rid="F6">Figure 6</xref>, the application of regulatory technology demonstrates significant effectiveness in market risk intervention. After transitioning from manual to AI-based approval, the regulatory response time was reduced from 2.1 h to 0.5 h, accompanied by a corresponding 58% decrease in the loss rate of retail investors. This improvement not only highlights the importance of enhancing regulatory response speed in addressing high-frequency trading within China&#x2019;s financial markets but also demonstrates that shortening the policy transmission chain can effectively curb the diffusion effect of algorithmic resonance, thereby enhancing the timeliness and precision of market supervision.</p>
<fig id="F6" position="float">
<label>FIGURE 6</label>
<caption>
<p>Manual Approval vs. Al Approval Comparison.</p>
</caption>
<graphic xlink:href="fphy-13-1733200-g006.tif">
<alt-text content-type="machine-generated">Bar chart comparing manual and AI approval processes. Manual approval shows 2.1 hours and a 100% retail investor loss rate. AI approval shows 0.5 hours and a 42% loss rate.</alt-text>
</graphic>
</fig>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Research conclusions and policy recommendations</title>
<sec id="s4-1">
<label>4.1</label>
<title>Research conclusions</title>
<p>Based on the unique dual structure of China&#x2019;s financial market&#x2014;characterized by &#x201c;retail investor dominance (80% of trading volume) and foreign capital&#x2019;s technological monopoly (0.3% of institutions controlling 43.6% of order flow)&#x201d;&#x2014;this paper constructs a four-layer complex network Agent-Based Model (ABM) incorporating policy intervention nodes, comprising the &#x201c;regulatory layer, core layer, market maker layer, and retail investor layer.&#x201d; Through topological structure modeling, percolation phase transition early warning, and computable regulatory tool design, the risk transmission mechanism in a high-frequency trading environment was systematically simulated. The results indicate that:<list list-type="order">
<list-item>
<p>High-frequency trading exacerbates market fairness imbalance through technological monopoly, forming a &#x201c;technology oligopoly&#x201d; landscape. Foreign institutions, leveraging microsecond-level latency advantages (e.g., exclusive microwave towers), have built an insurmountable &#x201c;technological moat.&#x201d; When the communication latency gap exceeds the critical threshold of 50 ms, the probability of retail investors&#x2019; orders being intercepted by high-frequency trading algorithms via &#x201c;latency arbitrage&#x201d; nonlinearly surges to over 82%. This not only implies a systematic disadvantage for retail investors at the order execution level but more fundamentally reveals a sharp concentration of market power in the hands of a few technological oligopolies, eroding the fairness foundation of China&#x2019;s &#x201c;retail-driven market&#x201d;.</p>
</list-item>
<list-item>
<p>The &#x201c;algorithmic resonance&#x201d; triggered by high-frequency trading acts as a detonator for new systemic risks. This study quantifies the fatal risk associated with the homogenization of high-frequency trading strategies (coefficient <inline-formula id="inf51">
<mml:math id="m59">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>). When a large number of institutions adopt similar algorithmic strategies (<inline-formula id="inf52">
<mml:math id="m60">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> &#x3e; 0.65 critical threshold), the market network undergoes a &#x201c;percolation phase transition,&#x201d; where the probability of systemic risk abruptly jumps from below 0.2 to over 0.7. In other words, the convergent behavior of high-frequency trading transforms the market into a highly fragile &#x201c;resonance body,&#x201d; where local disturbances can rapidly propagate into global liquidity collapse through highly connected core nodes.</p>
</list-item>
<list-item>
<p>The rapid iteration speed of high-frequency trading technology poses a dimensional challenge to traditional regulatory paradigms. high-frequency trading exploits algorithmic black boxes (changing IDs every 2.1 h) and cross-border regulatory arbitrage, rendering conventional regulatory tools nearly ineffective. If the average regulatory response delay reaches 2.1 h, the risk identification rate drops to 38%, and the cross-border order parsing failure rate rises to 89%. This exposes the inherent vulnerability of the old regulatory system&#x2014;characterized by &#x201c;manual, ex-post, rule-based&#x201d; approaches&#x2014;in the face of high-frequency trading&#x2019;s &#x201c;machine-driven, real-time, algorithm-code&#x201d; dynamics, leading to a &#x201c;governance paradigm fracture.&#x201d;</p>
</list-item>
</list>
</p>
</sec>
<sec id="s4-2">
<label>4.2</label>
<title>Policy recommendations</title>
<p>Based on the above research conclusions, and to construct a modern regulatory system that aligns with the unique characteristics of China&#x2019;s financial market and can keep pace with the rapid technological evolution of high-frequency trading, the following policy recommendations are proposed:<list list-type="order">
<list-item>
<p>Implement &#x201c;technological anti-monopoly&#x201d; measures to curb excessive concentration of market power: establish a &#x201c;technical latency differential&#x201d; red line by explicitly adding an upper limit on latency disparity in the &#x201c;Algorithmic Trading Management Rules,&#x201d; strictly restricting behaviors that systematically intercept orders through abnormal latency advantages; introduce a &#x201c;digital tax base&#x201d; by drawing on the spirit of the &#x201c;Anti-Monopoly Law&#x201d; to study and launch a &#x201c;high-frequency trading tax&#x201d; or &#x201c;sovereign compensation fund&#x201d; to adjust excess profits obtained through technological hegemony, which would be used for market fairness infrastructure or investor compensation funds [<xref ref-type="bibr" rid="B36">36</xref>].</p>
</list-item>
</list>
</p>
<p>To effectively address the technological monopoly brought by HFT, a phased, progressive implementation pathway is recommended:<list list-type="roman-lower">
<list-item>
<p>Phase I (Months 1&#x2013;6): Establish a Latency Disparity Monitoring System. Collaborate with exchanges and data service providers to develop a tool that can quantify in real-time the order execution latency <inline-formula id="inf53">
<mml:math id="m61">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>&#x3c4;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> disparities among different market participants. This system aims to identify and consistently flag market participants who enjoy a significant &#x201c;latency advantage,&#x201d; providing a data foundation for subsequent interventions.</p>
</list-item>
<list-item>
<p>Phase II (Months 7&#x2013;12): Pilot a Digital Tax Base. Within the scope of technological monopolists identified by the monitoring system, pilot a &#x201c;digital tax&#x201d; based on excess profits or trading volume share. The tax revenue can be channeled into a &#x201c;Market Stability Fund&#x201d; to compensate retail investors who suffer losses due to technological disadvantages.</p>
</list-item>
<list-item>
<p>Phase III (Months 13&#x2013;18): Full Rollout of a Sovereign Compensation Fund. Building on the success of the pilot, institutionalize and normalize the compensation mechanism. Establish a regulator-led &#x201c;Sovereign Compensation Fund&#x201d; that determines compensation ratios through more sophisticated algorithms (e.g., a composite function based on latency disparity <inline-formula id="inf54">
<mml:math id="m62">
<mml:mrow>
<mml:mo>&#x394;</mml:mo>
<mml:mi>L</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> and trading contribution), fundamentally offsetting market inequity caused by technological monopoly.</p>
</list-item>
<list-item>
<p>Construct a real-time monitoring and blocking mechanism targeting &#x201c;algorithmic resonance&#x201d;: not only incorporate the strategy homogeneity coefficient into core risk control indicators, establishing an exchange mechanism for real-time calculation and monitoring of the market-wide strategy homogeneity coefficient (<inline-formula id="inf55">
<mml:math id="m63">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>), with clear warning intervals (<inline-formula id="inf56">
<mml:math id="m64">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> &#x3e; 0.6) and intervention thresholds (<inline-formula id="inf57">
<mml:math id="m65">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3c1;</mml:mi>
<mml:mi>c</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> &#x3d; 0.65), but also simultaneously deploy dynamic circuit-breaker algorithms that automatically trigger differentiated measures upon reaching thresholds, specifically restricting high-frequency order flow to structurally dismantle the conditions for algorithmic resonance.</p>
</list-item>
</list>
</p>
<p>For the early-warning mechanism based on the strategy homogeneity coefficient <inline-formula id="inf58">
<mml:math id="m66">
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula>, the following tiered response system can be constructed:<list list-type="roman-lower">
<list-item>
<p>Warning Threshold <inline-formula id="inf59">
<mml:math id="m67">
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mo>&#x3e;</mml:mo>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mn>0.6</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula>: When the model-calculated market-wide strategy homogeneity coefficient exceeds 0.6 for 5 consecutive minutes, the system automatically issues a &#x201c;watch&#x201d; level alert to the regulatory backend. At this stage, regulatory personnel should enhance visual inspection of abnormal trading activities but refrain from taking immediate action.</p>
</list-item>
<list-item>
<p>Intervention Threshold <inline-formula id="inf60">
<mml:math id="m68">
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mo>&#x3e;</mml:mo>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mn>0.65</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula>: When the coefficient further climbs above 0.65, the system automatically triggers an &#x201c;intervention&#x201d; level alert. At this point, pre-set automated regulatory tools can be activated, such as imposing minor random delays (i.e., &#x201c;speed bumps&#x201d;) on a portion of high-frequency orders or temporarily increasing transaction costs for specific types of algorithmic trading. This aims to increase market strategy diversity and break the self-reinforcing cycle of risk.</p>
</list-item>
<list-item>
<p>Comprehensively promote the &#x201c;digital and intelligent&#x201d; transformation of the regulatory system, developing &#x201c;regulation as code&#x201d; capabilities, scaling up the application of AI, enhancing the monitoring and analysis capabilities of market data, and establishing &#x201c;regulatory sandboxes&#x201d; for rapid testing of new regulatory tools, with the goal of reducing the average response time to high-frequency trading anomalies from &#x201c;hours&#x201d; to &#x201c;minutes&#x201d; [<xref ref-type="bibr" rid="B37">37</xref>].</p>
</list-item>
</list>
</p>
<p>To support the above complex regulatory strategies, the intelligent transformation of the regulatory agency itself is crucial:<list list-type="roman-lower">
<list-item>
<p>Pathway Planning: Evolve from &#x201c;Manual Review&#x201d; to &#x201c;AI-Assisted Decision-Making&#x201d; and finally to &#x201c;Automated Regulation.&#x201d; Initially, use AI models for preliminary screening and risk tagging of massive trading data to assist human decision-making. In the medium term, establish an AI decision-support system that provides regulators with simulations of the expected outcomes of various intervention strategies [<xref ref-type="bibr" rid="B38">38</xref>]. In the long term, achieve full-process automation from monitoring to intervention in areas where risk thresholds are clear and intervention logic is well-defined.</p>
</list-item>
<list-item>
<p>Technical Support: Referencing the simulation results of this study, AI-driven regulation can shorten risk identification and response time by over 70%, significantly reducing market losses during extreme market conditions. Therefore, priority should be given to investing resources in building a RegTech platform based on machine learning.</p>
</list-item>
</list>
</p>
</sec>
</sec>
<sec sec-type="conclusion" id="s5">
<label>5</label>
<title>Conclusion</title>
<p>High-frequency trading has fundamentally altered the risk landscape of China&#x2019;s financial markets. Addressing this challenge can no longer rely on incremental institutional adjustments but necessitates a profound regulatory revolution. The core imperative lies in acknowledging that the market has evolved into a high-dimensional complex system driven by code and algorithms. Regulators must correspondingly employ algorithms and code as strategic tools, embracing a paradigm shift of &#x201c;governing technology with technology&#x201d; to effectively mitigate the risks posed by high-frequency trading and ensure the stable and sustainable development of China&#x2019;s financial markets amid rapid technological transformation.</p>
</sec>
</body>
<back>
<sec sec-type="data-availability" id="s6">
<title>Data availability statement</title>
<p>The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation.</p>
</sec>
<sec sec-type="author-contributions" id="s7">
<title>Author contributions</title>
<p>XJ: Writing &#x2013; original draft, Formal Analysis, Software, Investigation, Writing &#x2013; review and editing. ZY: Conceptualization, Writing &#x2013; review and editing, Formal Analysis, Writing &#x2013; original draft, Investigation, Validation. HL: Methodology, Formal Analysis, Visualization, Resources, Writing &#x2013; original draft, Investigation, Writing &#x2013; review and editing.</p>
</sec>
<sec sec-type="COI-statement" id="s9">
<title>Conflict of interest</title>
<p>The author(s) declared that this work was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="ai-statement" id="s10">
<title>Generative AI statement</title>
<p>The author(s) declared that generative AI was not used in the creation of this manuscript.</p>
<p>Any alternative text (alt text) provided alongside figures in this article has been generated by Frontiers with the support of artificial intelligence and reasonable efforts have been made to ensure accuracy, including review by the authors wherever possible. If you identify any issues, please contact us.</p>
</sec>
<sec sec-type="disclaimer" id="s11">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<fn-group>
<fn fn-type="custom" custom-type="edited-by">
<p>
<bold>Edited by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/797979/overview">Hui-Jia Li</ext-link>, Beijing University of Posts and Telecommunications (BUPT), China</p>
</fn>
<fn fn-type="custom" custom-type="reviewed-by">
<p>
<bold>Reviewed by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/2815207/overview">Manman Yuan</ext-link>, Inner Mongolia University, China</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/3282478/overview">Jianfu Chen</ext-link>, Nanhang Jincheng College, China</p>
</fn>
</fn-group>
<ref-list>
<title>References</title>
<ref id="B1">
<label>1.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bing</surname>
<given-names>T</given-names>
</name>
</person-group>. <article-title>The impact of COVID-19 on the relation between retail investors&#x2019; trading and stock returns in the Chinese market</article-title>. <source>Asian Econ Lett</source> (<year>2021</year>) <volume>2</volume>(<issue>1</issue>). <pub-id pub-id-type="doi">10.46557/001c.19015</pub-id>
</mixed-citation>
</ref>
<ref id="B2">
<label>2.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bing</surname>
<given-names>T</given-names>
</name>
</person-group>. <article-title>Machine-Learning in the Chinese stock market</article-title>. <source>SSRN</source> (<year>2020</year>). <pub-id pub-id-type="doi">10.2139/ssrn.3754339</pub-id>
</mixed-citation>
</ref>
<ref id="B3">
<label>3.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chen</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>Y</given-names>
</name>
</person-group>. <article-title>Noise trading and stock returns: evidence from China</article-title>. <source>China Finance Rev Int</source> (<year>2013</year>) <volume>3</volume>(<issue>2</issue>):<fpage>301</fpage>&#x2013;<lpage>15</lpage>. <pub-id pub-id-type="doi">10.1108/CFRI-02-2012-0017</pub-id>
</mixed-citation>
</ref>
<ref id="B4">
<label>4.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bae</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Yi</surname>
<given-names>Z</given-names>
</name>
</person-group>. <article-title>Stock market liberalization, foreign institutional investors, and informational efficiency of stock prices: evidence from an emerging market</article-title>. <source>Int J Finance &#x26; Econ</source> (<year>2020</year>) <volume>26</volume>(<issue>4</issue>):<fpage>5223</fpage>&#x2013;<lpage>45</lpage>. <pub-id pub-id-type="doi">10.1002/ijfe.2074</pub-id>
</mixed-citation>
</ref>
<ref id="B5">
<label>5.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Baldauf</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Moliner</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>High&#x2010;Frequency trading and market performance</article-title>. <source>J Finance</source> (<year>2020</year>) <volume>75</volume>(<issue>3</issue>):<fpage>1495</fpage>&#x2013;<lpage>526</lpage>. <pub-id pub-id-type="doi">10.1111/jofi.12882</pub-id>
</mixed-citation>
</ref>
<ref id="B6">
<label>6.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Budish</surname>
<given-names>E</given-names>
</name>
<name>
<surname>Cramton</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Shim</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>The high-frequency trading arms race: frequent batch auctions as a market design response</article-title>. <source>Q J Econ</source> (<year>2015</year>) <volume>130</volume>(<issue>4</issue>):<fpage>1547</fpage>&#x2013;<lpage>621</lpage>. <pub-id pub-id-type="doi">10.1093/qje/qjv027</pub-id>
</mixed-citation>
</ref>
<ref id="B7">
<label>7.</label>
<mixed-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Funie</surname>
<given-names>A-I</given-names>
</name>
<name>
<surname>Salmon</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Luk</surname>
<given-names>W</given-names>
</name>
</person-group>. <article-title>A hybrid genetic-programming swarm-optimization approach for examining the nature and stability of high-frequency trading strategies</article-title>. In: <conf-name>2014 13th International Conference on Machine Learning and Applications</conf-name>. <publisher-loc>Detroit, MI, USA</publisher-loc> (<year>2014</year>). p. <fpage>29</fpage>&#x2013;<lpage>34</lpage>. <pub-id pub-id-type="doi">10.1109/ICMLA.2014.11</pub-id>
</mixed-citation>
</ref>
<ref id="B8">
<label>8.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cont</surname>
<given-names>R</given-names>
</name>
</person-group>. <article-title>Empirical properties of asset returns: stylized facts and statistical issues</article-title>. <source>J Quantitative Finance</source> (<year>2001</year>) <volume>1</volume>(<issue>2</issue>):<fpage>223</fpage>&#x2013;<lpage>36</lpage>. <pub-id pub-id-type="doi">10.1080/713665670</pub-id>
</mixed-citation>
</ref>
<ref id="B9">
<label>9.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zheng- yuan</surname>
<given-names>WE</given-names>
</name>
<name>
<surname>Yan</surname>
<given-names>HU</given-names>
</name>
<name>
<surname>Wen</surname>
<given-names>L</given-names>
</name>
</person-group>. <article-title>Study on the high frequency data of the financial market in China by using the VaR method</article-title>. <source>Journal Chongqing Univ Technol Nat Science</source> (<year>2014</year>) <volume>2014</volume>(<issue>8</issue>):<fpage>126</fpage>&#x2013;<lpage>31</lpage>. <pub-id pub-id-type="doi">10.3969/j.issn.1674-8425(z).2014.08.026</pub-id>
</mixed-citation>
</ref>
<ref id="B10">
<label>10.</label>
<mixed-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Pellizzari</surname>
<given-names>P</given-names>
</name>
</person-group>. <article-title>In whose best interest? An agent-based model of high frequency trading</article-title>. In: <source>Handbook of computational economics</source>, <volume>4</volume>. <publisher-name>Springer</publisher-name> (<year>2017</year>). p. <fpage>35</fpage>&#x2013;<lpage>58</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-319-19629-9_2</pub-id>
</mixed-citation>
</ref>
<ref id="B11">
<label>11.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Pagnotta</surname>
<given-names>ES</given-names>
</name>
<name>
<surname>Philippon</surname>
<given-names>T</given-names>
</name>
</person-group>. <article-title>Competing on speed</article-title>. <source>Econometrica</source> (<year>2018</year>) <volume>86</volume>(<issue>3</issue>):<fpage>1067</fpage>&#x2013;<lpage>115</lpage>. <pub-id pub-id-type="doi">10.3982/ECTA11968</pub-id>
</mixed-citation>
</ref>
<ref id="B12">
<label>12.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Luo</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>C</given-names>
</name>
</person-group>. <article-title>Analysis of the impact of high-frequency trading on financial markets</article-title>. <source>Stat Appl</source> (<year>2024</year>) <volume>13</volume>(<issue>3</issue>):<fpage>934</fpage>&#x2013;<lpage>42</lpage>. <pub-id pub-id-type="doi">10.12677/sa.2024.133095</pub-id>
</mixed-citation>
</ref>
<ref id="B13">
<label>13.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>L</given-names>
</name>
</person-group>. <article-title>Federal learning for cross-border financial surveillance: a compliance framework under GDPR and China&#x2019;s data security law</article-title>. <source>J Financial Regul</source> (<year>2021</year>) <volume>7</volume>(<issue>2</issue>):<fpage>89</fpage>&#x2013;<lpage>112</lpage>. <pub-id pub-id-type="doi">10.1093/jfr/fjab012</pub-id>
</mixed-citation>
</ref>
<ref id="B14">
<label>14.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Platt</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Gebbie</surname>
<given-names>T</given-names>
</name>
</person-group>, <article-title>The problem of calibrating an agent-based model of high-frequency trading</article-title>. <source>Arxiv, Art No. arXiv:1606.01495</source> (<year>2016</year>) <pub-id pub-id-type="doi">10.48550/arXiv.1606.01495</pub-id>
</mixed-citation>
</ref>
<ref id="B15">
<label>15.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Podobnik</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Stanley</surname>
<given-names>HE</given-names>
</name>
</person-group>. <article-title>High-frequency trading model for a complex trading hierarchy</article-title>. <source>Quantitative Finance</source> (<year>2012</year>) <volume>12</volume>(<issue>4</issue>):<fpage>559</fpage>&#x2013;<lpage>66</lpage>. <pub-id pub-id-type="doi">10.1080/14697688.2012.664928</pub-id>
</mixed-citation>
</ref>
<ref id="B16">
<label>16.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>L&#xf3;pez de Prado</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Leinweber</surname>
<given-names>D</given-names>
</name>
</person-group>. <article-title>Advances in high frequency strategies: a practitioner&#x2019;s guide</article-title>. <source>J Trading</source> (<year>2012</year>) <volume>7</volume>(<issue>4</issue>):<fpage>20</fpage>&#x2013;<lpage>38</lpage>. <pub-id pub-id-type="doi">10.3905/jot.2012.7.4.020</pub-id>
</mixed-citation>
</ref>
<ref id="B17">
<label>17.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gao</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Vytelingum</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Weston</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Luk</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Guo</surname>
<given-names>C</given-names>
</name>
</person-group> (<year>2022</year>) <article-title>High-frequency financial market simulation and flash crash scenarios analysis: an agent-based modelling approach</article-title>. <pub-id pub-id-type="doi">10.48550/arXiv.2208.13654</pub-id>
</mixed-citation>
</ref>
<ref id="B18">
<label>18.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gai</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Kapadia</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>Contagion in financial networks</article-title>. <source>Proc R Soc A: Math Phys Eng Sci</source> (<year>2010</year>) <volume>466</volume>(<issue>2120</issue>):<fpage>2401</fpage>&#x2013;<lpage>23</lpage>. <pub-id pub-id-type="doi">10.1098/rspa.2009.0410</pub-id>
</mixed-citation>
</ref>
<ref id="B19">
<label>19.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Battiston</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Puliga</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Kaushik</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Tasca</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Caldarelli</surname>
<given-names>G</given-names>
</name>
</person-group>. <article-title>Debt Rank: too central to fail? Financial networks, the FED and systemic risk</article-title>. <source>Scientific Rep</source> (<year>2012</year>) <volume>2</volume>(<issue>1</issue>):<fpage>541</fpage>. <pub-id pub-id-type="doi">10.1038/srep00541</pub-id>
<pub-id pub-id-type="pmid">22870377</pub-id>
</mixed-citation>
</ref>
<ref id="B20">
<label>20.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yuan</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Xiong</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>G</given-names>
</name>
</person-group>. <article-title>Designing pinning control synchronization scheme for inertial memristive neural networks with dynamic granger causality</article-title>. <source>IEEE Trans Automation Sci Eng</source> (<year>2025</year>) <volume>22</volume>:<fpage>20934</fpage>&#x2013;<lpage>50</lpage>. <pub-id pub-id-type="doi">10.1109/TASE.2025.3603010</pub-id>
</mixed-citation>
</ref>
<ref id="B21">
<label>21.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>H-J</given-names>
</name>
<name>
<surname>Lou</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>G</given-names>
</name>
</person-group>. <article-title>Interpretable graph clustering on massive attribute networks Via multi-agent dynamic game</article-title>. <source>Chaos, Solitons and Fractals</source> (<year>2025</year>) <volume>199</volume>(<issue>1</issue>):<fpage>116654</fpage>. <pub-id pub-id-type="doi">10.1016/j.chaos.2025.116654</pub-id>
</mixed-citation>
</ref>
<ref id="B22">
<label>22.</label>
<mixed-citation publication-type="web">
<collab>People&#x27;s Bank of China Website</collab>. <article-title>People&#x27;s bank of China website</article-title> (<year>2025</year>). <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.gov.cn/lianbo/bumen/202506/content_7029797.htm">https://www.gov.cn/lianbo/bumen/202506/content_7029797.htm</ext-link>.</comment>
</mixed-citation>
</ref>
<ref id="B23">
<label>23.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Balc&#x131;</surname>
<given-names>MA</given-names>
</name>
<name>
<surname>Batrancea</surname>
<given-names>LM</given-names>
</name>
<name>
<surname>Akg&#xfc;ller</surname>
<given-names>&#xd6;</given-names>
</name>
<name>
<surname>Nichita</surname>
<given-names>A</given-names>
</name>
</person-group>. <article-title>Coarse graining on financial correlation networks</article-title>. <source>Mathematics</source> (<year>2022</year>) <volume>10</volume>:<fpage>2118</fpage>. <pub-id pub-id-type="doi">10.3390/math10122118</pub-id>
</mixed-citation>
</ref>
<ref id="B24">
<label>24.</label>
<mixed-citation publication-type="web">
<collab>China Securities Depository and Clearing</collab>. <article-title>Statistical Yearbook 2014</article-title> (<year>2015</year>). <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="http://www.chinaclear.cn/zdjs/tjnb/201505/fccf156c2f8d4b7b88a261fc185487cc/files/20180509154157375.pdf">http://www.chinaclear.cn/zdjs/tjnb/201505/fccf156c2f8d4b7b88a261fc185487cc/files/20180509154157375.pdf</ext-link>.</comment>
</mixed-citation>
</ref>
<ref id="B25">
<label>25.</label>
<mixed-citation publication-type="web">
<collab>CHINA STATISTICAL YEARBOOK</collab>. <article-title>CHINA STATISTICAL YEARBOOK</article-title> (<year>2025</year>). <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.stats.gov.cn/sj/ndsj/2024/indexch.htm">https://www.stats.gov.cn/sj/ndsj/2024/indexch.htm</ext-link>.</comment>
</mixed-citation>
</ref>
<ref id="B26">
<label>26.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Liu</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>Circuit breakers and the magnet effect: empirical evidence from China&#x27;s stock market</article-title>. <source>The Q J Finance</source> (<year>2020</year>) <volume>14</volume>(<issue>01</issue>):<fpage>164</fpage>&#x2013;<lpage>97</lpage>. <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="https://doi.org/CNKI:SUN:JKJR.0.2020-01-008">https://doi.org/CNKI:SUN:JKJR.0.2020-01-008</ext-link>.</comment>
</mixed-citation>
</ref>
<ref id="B27">
<label>27.</label>
<mixed-citation publication-type="web">
<collab>China Securities Regulatory Commission Annual Report</collab>. <article-title>China securities Regulatory Commission annual report</article-title> (<year>2025</year>). <comment>Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.csrc.gov.cn/csrc/c100024/c7523280/7523280/files/%E4%B8%AD%E5%9B%BD%E8%AF%81%E5%88%B8%E7%9B%91%E7%9D%A3%E7%AE%A1%E7%90%86%E5%A7%94%E5%91%98%E4%BC%9A%E5%B9%B4%E6%8A%A5%EF%BC%882023%E5%B9%B4%EF%BC%89.pdf">https://www.csrc.gov.cn/csrc/c100024/c7523280/7523280/files/%E4%B8%AD%E5%9B%BD%E8%AF%81%E5%88%B8%E7%9B%91%E7%9D%A3%E7%AE%A1%E7%90%86%E5%A7%94%E5%91%98%E4%BC%9A%E5%B9%B4%E6%8A%A5%EF%BC%882023%E5%B9%B4%EF%BC%89.pdf</ext-link>.</comment>
</mixed-citation>
</ref>
<ref id="B28">
<label>28.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Milenkovi&#x106;</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Pr&#x17d;ulj</surname>
<given-names>N</given-names>
</name>
<name>
<surname>Pr&#x17e;ulj</surname>
<given-names>N</given-names>
</name>
</person-group>. <article-title>Graphlet-based measures are suitable for biological network comparison</article-title>. <source>Bioinformatics</source> (<year>2013</year>) <volume>29</volume>(<issue>4</issue>):<fpage>483</fpage>&#x2013;<lpage>91</lpage>. <pub-id pub-id-type="doi">10.1093/bioinformatics/bts729</pub-id>
<pub-id pub-id-type="pmid">23349212</pub-id>
</mixed-citation>
</ref>
<ref id="B29">
<label>29.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>H-J</given-names>
</name>
<name>
<surname>Lou</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Perc</surname>
<given-names>M</given-names>
</name>
</person-group>. <article-title>Multiresolution clustering on massive attributed graphs by means of optimal aggregated markov chains</article-title>. <source>IEEE Trans Netw Sci Eng</source> (<year>2025</year>) <volume>1-10</volume>:<fpage>1</fpage>&#x2013;<lpage>10</lpage>. <pub-id pub-id-type="doi">10.1109/TNSE.2025.3579427</pub-id>
</mixed-citation>
</ref>
<ref id="B30">
<label>30.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Broadbent</surname>
<given-names>SR</given-names>
</name>
<name>
<surname>Hammersley</surname>
<given-names>JM</given-names>
</name>
</person-group>. <article-title>Percolation processes: I. Crystals and mazes</article-title>. <source>Proc Cambridge Philosophical Soc</source> (<year>1957</year>) <volume>53</volume>(<issue>3</issue>):<fpage>629</fpage>&#x2013;<lpage>41</lpage>. <pub-id pub-id-type="doi">10.1017/S0305004100032680</pub-id>
</mixed-citation>
</ref>
<ref id="B31">
<label>31.</label>
<mixed-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Stauffer</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Aharony</surname>
<given-names>A</given-names>
</name>
</person-group>. <source>Introduction to percolation theory</source>. <edition>2nd ed.</edition> <publisher-loc>London</publisher-loc>: <publisher-name>Taylor &#x0026; Francis</publisher-name> (<year>2018</year>). <pub-id pub-id-type="doi">10.1201/9781315274386</pub-id>
</mixed-citation>
</ref>
<ref id="B32">
<label>32.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>H-J</given-names>
</name>
<name>
<surname>Gao</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Qiu</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>G</given-names>
</name>
</person-group>. <article-title>Generalized cluster formation game for explainable attributed graph clustering</article-title>. <source>Chaos, Solitons and Fractals</source> (<year>2025</year>) <volume>200</volume>(<issue>1</issue>):<fpage>116947</fpage>. <pub-id pub-id-type="doi">10.1016/j.chaos.2025.116947</pub-id>
</mixed-citation>
</ref>
<ref id="B33">
<label>33.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Krieger</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Hens</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Podhorsk&#xe1;</surname>
<given-names>I</given-names>
</name>
</person-group>. <article-title>Inhomogeneous long-range percolation for real-life network modeling</article-title>. <source>Risks</source> (<year>2021</year>) <volume>9</volume>(<issue>1</issue>):<fpage>1</fpage>. <pub-id pub-id-type="doi">10.3390/risks9010001</pub-id>
</mixed-citation>
</ref>
<ref id="B34">
<label>34.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Achlioptas</surname>
<given-names>D</given-names>
</name>
<name>
<surname>D&#x2019;Souza</surname>
<given-names>RM</given-names>
</name>
<name>
<surname>Spencer</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>Explosive percolation in networks</article-title>. <source>Science</source> (<year>2009</year>) <volume>323</volume>(<issue>5920</issue>):<fpage>1453</fpage>&#x2013;<lpage>5</lpage>. <pub-id pub-id-type="doi">10.1126/science.1167782</pub-id>
<pub-id pub-id-type="pmid">19286548</pub-id>
</mixed-citation>
</ref>
<ref id="B35">
<label>35.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Papantoniou</surname>
<given-names>AA</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Regtech: steering the regulatory spaceship in the right direction?</article-title> <source>J Banking Financial Technology</source> <volume>6</volume>, <issue>6</issue>:<fpage>1</fpage>&#x2013;<lpage>16</lpage>. <pub-id pub-id-type="doi">10.1007/s42786-022-00038-9</pub-id>
</mixed-citation>
</ref>
<ref id="B36">
<label>36.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Grassi</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Lanfranchi</surname>
<given-names>D</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>RegTech in public and private sectors: the nexus between data, technology and regulation</article-title>. <source>J Ind Business Econ</source> <volume>49</volume>:<fpage>441</fpage>&#x2013;<lpage>79</lpage>. <pub-id pub-id-type="doi">10.1007/s40812-022-00226-0</pub-id>
</mixed-citation>
</ref>
<ref id="B37">
<label>37.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Nassr</surname>
<given-names>IK</given-names>
</name>
<name>
<surname>Koc</surname>
<given-names>F</given-names>
</name>
<name>
<surname>&#xc7;elik</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Dymacz</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Abbott</surname>
<given-names>E</given-names>
</name>
<name>
<surname>Gudmundson</surname>
<given-names>L</given-names>
</name>
</person-group>. <article-title>Regulatory approaches to artificial intelligence in finance</article-title>. <source>OECD Artif Intelligence Pap</source> (<year>2024</year>). <pub-id pub-id-type="doi">10.1787/f1498c02-en</pub-id>
</mixed-citation>
</ref>
<ref id="B38">
<label>38.</label>
<mixed-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Adeyelu</surname>
<given-names>OO</given-names>
</name>
<name>
<surname>Ugochukwu</surname>
<given-names>CE</given-names>
</name>
<name>
<surname>Shonibare</surname>
<given-names>MA</given-names>
</name>
</person-group>. <article-title>Automating financial regulatory compliance with AI: a review and application scenarios</article-title>. <source>Finance &#x26; Account Res J</source> (<year>2024</year>) <volume>6</volume>(<issue>4</issue>):<fpage>580</fpage>&#x2013;<lpage>601</lpage>. <pub-id pub-id-type="doi">10.51594/farj.v6i4.1035</pub-id>
</mixed-citation>
</ref>
</ref-list>
</back>
</article>