{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T15:08:39Z","timestamp":1764688119216,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031775703"},{"type":"electronic","value":"9783031775710"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-77571-0_70","type":"book-chapter","created":{"date-parts":[[2024,12,20]],"date-time":"2024-12-20T02:02:43Z","timestamp":1734660163000},"page":"743-754","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Privacy-Preserving Federated Learning Framework for Financial Crime"],"prefix":"10.1007","author":[{"given":"Abdul","family":"Haseeb","sequence":"first","affiliation":[]},{"given":"Idongesit","family":"Ekerete","sequence":"additional","affiliation":[]},{"given":"Samuel","family":"Moore","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,21]]},"reference":[{"issue":"3","key":"70_CR1","first-page":"1","volume":"13","author":"Q Yang","year":"2019","unstructured":"Yang, Q., Liu, Y., Cheng, Y., Kang, Y., Chen, T., Yu, H.: Federated learning. Synth. Lect. Artif. Intell. Mach. Learn. 13(3), 1\u2013207 (2019)","journal-title":"Synth. Lect. Artif. Intell. Mach. Learn."},{"key":"70_CR2","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., y Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: Artificial Intelligence and Statistics, pp. 1273\u20131282. PMLR (2017)"},{"key":"70_CR3","doi-asserted-by":"publisher","unstructured":"Narula, M., Meena, J., Vishwakarma, D.K.: A comprehensive review on federated learning for data-sensitive application: open issues & challenges. Eng. Appl. Artif. Intell. 133 (2024). https:\/\/doi.org\/10.1016\/j.engappai.2024.108128.10.1016\/j.engappai.2024.108128","DOI":"10.1016\/j.engappai.2024.108128.10.1016\/j.engappai.2024.108128"},{"key":"70_CR4","doi-asserted-by":"publisher","unstructured":"Almazroi, A.A., Ayub, N.: Online payment fraud detection model using machine learning techniques. Access 11, 137188\u2013137203 (2023). https:\/\/ieeexplore.ieee.org\/document\/10341223. https:\/\/doi.org\/10.1109\/ACCESS.2023.3339226","DOI":"10.1109\/ACCESS.2023.3339226"},{"key":"70_CR5","doi-asserted-by":"publisher","unstructured":"A. Abdallah, M. A. Maarof and A. Zainal, \u201cFraud detection system: a survey. J. Netw. Comput. Appl. 68, 90\u2013113 (2016). https:\/\/doi.org\/10.1016\/j.jnca.2016.04.007","DOI":"10.1016\/j.jnca.2016.04.007"},{"key":"70_CR6","doi-asserted-by":"crossref","unstructured":"Sharma, P., et al.: Machine learning model for credit card fraud detection- a comparative analysis. Int. Arab J. Inf. Technol. (2021)","DOI":"10.34028\/iajit\/18\/6\/6"},{"issue":"4","key":"70_CR7","doi-asserted-by":"publisher","first-page":"3347","DOI":"10.1109\/TKDE.2021.3124599","volume":"35","author":"Q Li","year":"2021","unstructured":"Li, Q., et al.: A survey on federated learning systems: vision, hype and reality for data privacy and protection. IEEE Trans. Knowl. Data Eng. 35(4), 3347\u20133366 (2021)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"70_CR8","unstructured":"Abadi, A., et al.: Starlit: privacy-preserving federated learning to enhance financial fraud detection. arXiv Preprint arXiv:2401.10765 (2024)"},{"issue":"5","key":"70_CR9","first-page":"3414","volume":"29","author":"NK Trivedi","year":"2020","unstructured":"Trivedi, N.K., et al.: An efficient credit card fraud detection model based on machine learning methods. Int. J. Adv. Sci. Technol. 29(5), 3414\u20133424 (2020)","journal-title":"Int. J. Adv. Sci. Technol."},{"key":"70_CR10","unstructured":"Bonawitz, K., et al.: Towards FL at scale: system design. In: Proceedings of the 2nd SysML Conference (2019)"},{"key":"70_CR11","unstructured":"McMahan, H.B., et al.: FL: collaborative machine learning without centralized training data. Google Research Blog (2017)"},{"key":"70_CR12","unstructured":"Kairouz, P., et al.: Advances and open problems in FL. In: Proceedings of the 2019 ACM Workshop on Privacy-Preserving Machine Learning (2019)"},{"key":"70_CR13","doi-asserted-by":"crossref","unstructured":"Sheller, M.J., et al.: Federated learning in medicine: facilitating multi-institutional collaborations without sharing patient data. Sci. Rep. 10(1), 12598 (2020)","DOI":"10.1038\/s41598-020-69250-1"},{"key":"70_CR14","doi-asserted-by":"crossref","unstructured":"Liu, S., et al.: Blockchain-based decentralized federated learning method in edge computing environment. Appl. Sci. 13(3), 1677 (2023)","DOI":"10.3390\/app13031677"},{"key":"70_CR15","doi-asserted-by":"crossref","unstructured":"Wang, J., et al.: Approx-SMOTE federated learning credit card fraud detection system. In: IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC), pp. 1370\u20131375 (2023)","DOI":"10.1109\/COMPSAC57700.2023.00208"},{"key":"70_CR16","unstructured":"Kone\u010dn\u00fd, J., et al.: Federated learning: strategies for improving communication efficiency. Cornell University Library, arXiv.org, Ithaca (2017)"},{"issue":"2","key":"70_CR17","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MIC.2021.3138853","volume":"26","author":"D He","year":"2022","unstructured":"He, D., Du, R., Zhu, S., Zhang, M., Liang, K., Chan, S.: Secure logistic regression for vertical federated learning. IEEE Internet Comput. 26(2), 61\u201368 (2022)","journal-title":"IEEE Internet Comput."},{"key":"70_CR18","doi-asserted-by":"crossref","unstructured":"Quan, M.K., et al.: Towards privacy-preserving waste classification in the Internet of Things. IEEE Internet of Things J. (2024)","DOI":"10.1109\/JIOT.2024.3386727"},{"key":"70_CR19","doi-asserted-by":"crossref","unstructured":"P. Mohassel and Yupeng Zhang, \u201cSecureML: A system for scalable privacy-preserving machine learning. In: IEEE Symposium on Security and Privacy, pp. 19\u201338 (2017)","DOI":"10.1109\/SP.2017.12"},{"key":"70_CR20","unstructured":"Li, W., et al.: Efficient and privacy-enhanced federated learning based on parameter degradation. TSC, 1\u201316 (2024)"},{"issue":"8","key":"70_CR21","doi-asserted-by":"publisher","first-page":"10511","DOI":"10.1007\/s11227-023-05846-4","volume":"80","author":"GK Jagarlamudi","year":"2024","unstructured":"Jagarlamudi, G.K., et al.: Exploring privacy measurement in federated learning. J. Supercomput. 80(8), 10511\u201310551 (2024)","journal-title":"J. Supercomput."},{"key":"70_CR22","doi-asserted-by":"crossref","unstructured":"Asad, M., et al.: A comprehensive survey on privacy-preserving techniques in federated recommendation systems. Appl. Sci. 13(10), 6201 (2023)","DOI":"10.3390\/app13106201"},{"key":"70_CR23","unstructured":"Yang, Z., et al.: Defending model inversion and membership inference attacks via prediction purification. Cornell University Library, arXiv.org, Ithaca (2020)"},{"key":"70_CR24","doi-asserted-by":"crossref","unstructured":"Guendouzi, B.S., et al.: A systematic review of federated learning: challenges, aggregation methods, and development tools. J. Netw. Comput. Appl. 220(9), 103714 (2023)","DOI":"10.1016\/j.jnca.2023.103714"},{"key":"70_CR25","unstructured":"Tien-Ju, Y., et al.: Online model compression for federated learning with large models. Cornell University Library, arXiv.org, Ithaca (2022)"},{"key":"70_CR26","unstructured":"Anonymous: Federated learning: advancing collaborative machine learning for a connected future. Int. Res. J. Modernization Eng. Technol. Sci. (2023)"},{"key":"70_CR27","doi-asserted-by":"crossref","unstructured":"Fu, L., et al.: Client selection in federated learning: principles, challenges, and opportunities. JIoT 10(24), 1 (2023)","DOI":"10.1109\/JIOT.2023.3299573"},{"key":"70_CR28","doi-asserted-by":"crossref","unstructured":"Lu, Z., et al.: Federated learning with Non-IID Data: a survey. JIoT 11(11), 19188\u201319209 (2024)","DOI":"10.1109\/JIOT.2024.3376548"},{"key":"70_CR29","doi-asserted-by":"crossref","unstructured":"Abreha, H.G., Hayajneh, M., Serhani, M.A.: Federated learning in edge computing: a systematic survey. Sensors 22(2), 450 (2022)","DOI":"10.3390\/s22020450"},{"key":"70_CR30","doi-asserted-by":"crossref","unstructured":"Liu, T., Hu, X., Shu, T.: Facilitating early-stage backdoor attacks in federated learning with whole population distribution inference. JIoT 10(12), 1 (2023)","DOI":"10.1109\/JIOT.2023.3237806"},{"key":"70_CR31","doi-asserted-by":"crossref","unstructured":"Butt, M., et al.:A fog-based privacy-preserving federated learning system for smart healthcare applications. Electronics (Basel) 12(19), 4074 (2023)","DOI":"10.3390\/electronics12194074"},{"key":"70_CR32","unstructured":"Lyu, L., et al.: Privacy and robustness in federated learning: attacks and defenses. In: IEEE Transactions on Neural Networks and Learning Systems, vol. 35, pp. 1\u201321 (2022)"},{"key":"70_CR33","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.neucom.2020.10.014","volume":"422","author":"A Tran","year":"2021","unstructured":"Tran, A., et al.: An efficient approach for privacy preserving decentralized deep learning models based on secure multi-party computation. Neurocomputing (Amsterdam) 422, 245\u2013262 (2021)","journal-title":"Neurocomputing (Amsterdam)"},{"key":"70_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2023.103723","volume":"86","author":"AK Nair","year":"2023","unstructured":"Nair, A.K., Raj, E.D., Sahoo, J.: A robust analysis of adversarial attacks on federated learning environments. Comput. Standards Interfaces 86, 103723 (2023)","journal-title":"Comput. Standards Interfaces"},{"key":"70_CR35","unstructured":"Anonymous: a survey on federated learning for resource-constrained IoT devices"},{"key":"70_CR36","doi-asserted-by":"publisher","unstructured":"Hema Priya, N., Rathika, P.D., Pushparaj, A.: Privacy preservation using federated learning for credit card transactions. In: Proceedings of the 2023 International Conference on Intelligent Systems for Communication, IoT and Security, ICISCoIS 2023, pp. 398\u2013403 (2023). https:\/\/doi.org\/10.1109\/ICISCoIS56541.2023.10100577","DOI":"10.1109\/ICISCoIS56541.2023.10100577"},{"issue":"5","key":"70_CR37","first-page":"283","volume":"7","author":"C Sudha","year":"2019","unstructured":"Sudha, C., Akila, D.: Detection OFAES algorithm for data security on credit card transaction. Int. J. Recent Technol. Eng. 7(5), 283\u2013287 (2019)","journal-title":"Int. J. Recent Technol. Eng."}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of the International Conference on Ubiquitous Computing and Ambient Intelligence (UCAmI 2024)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-77571-0_70","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,20]],"date-time":"2024-12-20T02:12:50Z","timestamp":1734660770000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-77571-0_70"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031775703","9783031775710"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-77571-0_70","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"21 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"UCAmI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Ubiquitous Computing and Ambient Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belfast","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ucami2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ucami.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}