{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T21:09:28Z","timestamp":1774732168549,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T00:00:00Z","timestamp":1755648000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T00:00:00Z","timestamp":1755648000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s12083-025-02086-6","type":"journal-article","created":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T12:45:49Z","timestamp":1755693949000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["BAML: a decentralized approach to secure, privacy-preserving financial compliance for enhancing anti-money laundering with blockchain hyperledger and federated learning"],"prefix":"10.1007","volume":"18","author":[{"given":"Abdullah Ayub","family":"Khan","sequence":"first","affiliation":[]},{"given":"Abdulmajeed","family":"Alsufyani","sequence":"additional","affiliation":[]},{"given":"Nawal","family":"Alsufyani","sequence":"additional","affiliation":[]},{"given":"Mohamad Afendee","family":"Mohamed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,20]]},"reference":[{"key":"2086_CR1","doi-asserted-by":"publisher","unstructured":"Han F, Yang P, Du H, & Li X (2024) Accuth+: Accelerometer-based anti-spoofing voice authentication on wrist-worn wearables. IEEE Trans Mob 23(5):5571\u20135588. https:\/\/doi.org\/10.1109\/TMC.2023.331483","DOI":"10.1109\/TMC.2023.331483"},{"key":"2086_CR2","doi-asserted-by":"publisher","unstructured":"Xu G, Xu S, Fan X et al (2025). RAT ring: Event driven publish\/subscribe communication protocol for IIoT by report and traceable ring signature. IEEE Trans Industr Inform 1\u20139. https:\/\/doi.org\/10.1109\/TII.2025.3567265","DOI":"10.1109\/TII.2025.3567265"},{"issue":"1","key":"2086_CR3","doi-asserted-by":"publisher","first-page":"61","DOI":"10.3390\/sym17010061","volume":"17","author":"BUI Khan","year":"2025","unstructured":"Khan BUI, Goh KW, Khan AR, Zuhairi MF, Chaimanee M (2025) Resource management and secure data exchange for mobile sensors using Ethereum blockchain. Symmetry 17(1):61","journal-title":"Symmetry"},{"issue":"5","key":"2086_CR4","first-page":"168","volume":"15","author":"RO Otubu","year":"2024","unstructured":"Otubu RO (2024) Harnessing artificial intelligence to combat money laundering in cryptocurrency transactions. J Emerg Trends Eng Appl Sci (JETEAS) 15(5):168\u2013176","journal-title":"J Emerg Trends Eng Appl Sci (JETEAS)"},{"key":"2086_CR5","doi-asserted-by":"crossref","unstructured":"Khan BUI, Goh KW, Zuhairi MF et al (2024) A scalability enhancement scheme for ethereum blockchains: A graph-based decentralized approach. Eng Technol Appl Sci Res 14(6):17725\u201317736","DOI":"10.48084\/etasr.8465"},{"key":"2086_CR6","doi-asserted-by":"publisher","unstructured":"Sun G, Liao D, Zhao D et al (2018) Live migration for multiple correlated virtual machines in cloud-based data centers. IEEE Trans Serv Comput 11(2):279-291. https:\/\/doi.org\/10.1109\/TSC.2015.2477825","DOI":"10.1109\/TSC.2015.2477825"},{"issue":"1","key":"2086_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-024-06782-7","volume":"81","author":"AA Khan","year":"2025","unstructured":"Khan AA, Laghari AA, Baqasah AM, Bacarra R, Alroobaea R, Alsafyani M, Alsayaydeh JAJ (2025) BDLT-IoMT-a novel architecture: SVM machine learning for robust and secure data processing in internet of medical things with blockchain cybersecurity. J Supercomputing 81(1):1\u201322","journal-title":"J Supercomputing"},{"key":"2086_CR8","doi-asserted-by":"crossref","unstructured":"Khan AA, Yang J, Laghari AA, Baqasah AM, Alroobaea R, Ku CS, Por LY (2025) BAIoT-EMS: consortium network for small-medium enterprises management system with blockchain and augmented intelligence of things. Eng Appl Artif Intell 141:109838","DOI":"10.1016\/j.engappai.2024.109838"},{"key":"2086_CR9","unstructured":"Khan A, Ayub AA, Laghari AM, Baqasah Roobaea alroobaea, Ahmad almadhor, Gabriel Avelino sampedro, and Natalia Kryvinska. Blockchain-enabled infrastructural security solution for serverless consortium fog and edge computing."},{"key":"2086_CR10","doi-asserted-by":"crossref","unstructured":"Khan AA, Chen YL, Hajjej F, Shaikh AA, Yang J, Ku CS, Por LY (2024) Digital forensics for the socio-cyber world (DF-SCW): anovel framework for deepfake multimedia investigation on social media platforms. Egypt Inf J 27:100502","DOI":"10.1016\/j.eij.2024.100502"},{"key":"2086_CR11","unstructured":"Khan AA, Laghari AA, Baqasah AM, Alroobaea R, Gadekallu TR, Sampedro GA, Zhu Y (2024) ORAN-B5G: A next generation open radio access network architecture with machine learning for beyond 5G in industrial 5.0. IEEE Transactions on Green Communications and Networking"},{"key":"2086_CR12","doi-asserted-by":"crossref","unstructured":"Khan AA, Laghari AA, Alroobaea R, Baqasah AM, Alsafyani M, Bacarra R, Alsayaydeh JA J (2024) Secure remote sensing data with blockchain distributed Ledger technology: asolution for smart cities. IEEE Access","DOI":"10.1109\/ACCESS.2024.3401591"},{"key":"2086_CR13","doi-asserted-by":"publisher","first-page":"109343","DOI":"10.1016\/j.compeleceng.2024.109343","volume":"118","author":"AA Khan","year":"2024","unstructured":"Khan AA, Dhabi S, Yang J, Alhakami W, Bourouis S, Yee L (2024) B-LPoET: amiddleware lightweight Proof-of-Elapsed time (PoET) for efficient distributed transaction execution and security on blockchain using multithreading technology. Comput Electr Eng 118:109343","journal-title":"Comput Electr Eng"},{"key":"2086_CR14","doi-asserted-by":"crossref","unstructured":"Wang Q, Tsai WT, Shi T (2024) GraphALM: active learning for detecting money laundering transactions on blockchain networks. IEEE Network","DOI":"10.1109\/MNET.2024.3457577"},{"issue":"2","key":"2086_CR15","doi-asserted-by":"publisher","first-page":"51","DOI":"10.59413\/ajocs\/v5.i.2.1","volume":"5","author":"H Verma","year":"2024","unstructured":"Verma H (2024) The impact of cryptocurrency on money laundering practices. Afr J Commercial Stud 5(2):51\u201360","journal-title":"Afr J Commercial Stud"},{"key":"2086_CR16","unstructured":"Balakrishnan A, Jain V, Chintale P, Gadiparthi S, Najana M (2024) Blockchain empowerment in sanctions and AML compliance: A transparent approach. Int J Comput Trends Technol"},{"key":"2086_CR17","doi-asserted-by":"publisher","unstructured":"Li H, Xia C, Wang T et al (2024) GRASS: Learning spatial-temporal properties from chainlike cascade data for microscopic diffusion Prediction. IEEE Trans Neural Netw 35(11):16313\u201316327. https:\/\/doi.org\/10.1109\/TNNLS.2023.3293689","DOI":"10.1109\/TNNLS.2023.3293689"},{"issue":"3","key":"2086_CR18","doi-asserted-by":"publisher","first-page":"59","DOI":"10.34021\/ve.2024.07.03(4)","volume":"7","author":"A Boyko","year":"2024","unstructured":"Boyko A, Zimbroff A, Mynenko S, Chen Y (2024) Anti-money laundering in the digital economy: institutional, financial, and educational channels. Virtual Econ 7(3):59\u201380","journal-title":"Virtual Econ"},{"issue":"1","key":"2086_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.55324\/josr.v4i1.2332","volume":"4","author":"ZA Fakrulloh","year":"2024","unstructured":"Fakrulloh ZA (2024) Reform of law enforcement to strengthen the legal system in eradicating money laundering through cryptocurrency investments. J Social Res 4(1):1\u201315","journal-title":"J Social Res"},{"issue":"2","key":"2086_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3626826","volume":"5","author":"S Subbagari","year":"2024","unstructured":"Subbagari S (2024) Counter measures to combat money laundering in the new digital age. Digit Threats: Res Pract 5(2):1\u201313","journal-title":"Digit Threats: Res Pract"},{"key":"2086_CR21","doi-asserted-by":"crossref","unstructured":"Gandhi H, Tandon K, Gite S, Pradhan B, Alamri A (2024) Navigating the complexity of money laundering: anti\u2013money laundering advancements with AI\/ML insights. Int J Smart Sens Int Syst, (1)","DOI":"10.2478\/ijssis-2024-0024"},{"issue":"1","key":"2086_CR22","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s12525-024-00714-2","volume":"34","author":"S H\u00e4gele","year":"2024","unstructured":"H\u00e4gele S (2024) Centralized exchanges vs. decentralized exchanges in cryptocurrency markets: A systematic literature review. Electron Markets 34(1):33","journal-title":"Electron Markets"},{"key":"2086_CR23","doi-asserted-by":"crossref","unstructured":"Esoimeme E (2024) Examining The Potential Misuse of Artificial Intelligence to Circumvent Technology-Based Processes For AML\/CFT Compliance in The Cryptocurrency Ecosysyem. CFT Compliance in The Cryptocurrency Ecosysyem (September 22, 2024)","DOI":"10.2139\/ssrn.4964272"},{"key":"2086_CR24","unstructured":"Medina M (2024) Money laundering: an analysis of the regulatory landscape. Banking Sector Challenges, and Cryptocurrency Risks"},{"issue":"7","key":"2086_CR25","doi-asserted-by":"publisher","first-page":"1205","DOI":"10.51594\/farj.v6i7.1313","volume":"6","author":"AD Ochigbo","year":"2024","unstructured":"Ochigbo AD, Tuboalabo A, Labake TT, Buinwi U, Layode O, Buinwi JA (2024) Legal frameworks for digital transactions: analyzing the impact of blockchain technology. Finance Acc Res J 6(7):1205\u20131223","journal-title":"Finance Acc Res J"},{"issue":"1","key":"2086_CR26","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s10657-024-09797-w","volume":"57","author":"V Benson","year":"2024","unstructured":"Benson V, Adamyk B, Chinnaswamy A, Adamyk O (2024) Harmonising cryptocurrency regulation in europe: opportunities for preventing illicit transactions. Eur J Law Econ 57(1):37\u201361","journal-title":"Eur J Law Econ"},{"key":"2086_CR27","doi-asserted-by":"crossref","unstructured":"Nelson FM, Prosperiani MD, Ramadhan CR, Andini PP (2024) Cracking the code: investigating the Hunt for Crypto assets in money laundering cases in Indonesia. J Indonesian Legal Stud 9(1)","DOI":"10.15294\/jils.vol9i1.4534"},{"issue":"6","key":"2086_CR28","doi-asserted-by":"publisher","first-page":"3955","DOI":"10.1111\/itor.13353","volume":"31","author":"C Tomacheski","year":"2024","unstructured":"Tomacheski C, Milan\u00e9s A, Urrutia S (2024) The nilcatenation problem and its application for detecting money laundering activities in cryptocurrency networks. Int Trans Oper Res 31(6):3955\u20133974","journal-title":"Int Trans Oper Res"},{"key":"2086_CR29","doi-asserted-by":"publisher","unstructured":"Yue M, Yan H, Han R et al (2025) A DDoS attack detection method based on IQR and DFFCNN in SDN. J Netw Comput Appl 240:104203. https:\/\/doi.org\/10.1016\/j.jnca.2025.104203","DOI":"10.1016\/j.jnca.2025.104203"},{"key":"2086_CR30","doi-asserted-by":"publisher","unstructured":"Dong X, & Yu M (2024) Time-varying effects of macro shocks on cross-border capital flows in China's bond market. International Review of Economics & Finance 96:103720. https:\/\/doi.org\/10.1016\/j.iref.2024.103720","DOI":"10.1016\/j.iref.2024.103720"},{"key":"2086_CR31","doi-asserted-by":"publisher","unstructured":"Zhang J, Sui H, Sun X et al (2024) GrabPhisher: Phishing scams detection in ethereum via temporally evolving GNNs. IEEE Trans Serv Comput 17(6):3727\u20133741. https:\/\/doi.org\/10.1109\/TSC.2024.3411449","DOI":"10.1109\/TSC.2024.3411449"},{"key":"2086_CR32","doi-asserted-by":"publisher","unstructured":"Lu H, & Wu Z (2025) Revisiting intelligent audit from a data science perspective. Neurocomputing 623:129431. https:\/\/doi.org\/10.1016\/j.neucom.2025.129431","DOI":"10.1016\/j.neucom.2025.129431"},{"key":"2086_CR33","doi-asserted-by":"publisher","unstructured":"Xu Y, Xu H, Chen X et al (2025) Blockchain-based AR offloading in UAV-enabled MEC networks: A trade-off between energy consumption and rendering latency. IEEE Trans Veh Technol 1\u201316. https:\/\/doi.org\/10.1109\/TVT.2025.3581015","DOI":"10.1109\/TVT.2025.3581015"},{"key":"2086_CR34","doi-asserted-by":"publisher","unstructured":"Hu J, Jiang H, Chen S et al (2024) WiShield: Privacy against Wi-Fi human tracking. IEEE journal on selected areas in communications 42(10):2970\u20132984. https:\/\/doi.org\/10.1109\/JSAC.2024.3414597","DOI":"10.1109\/JSAC.2024.3414597"},{"key":"2086_CR35","doi-asserted-by":"publisher","unstructured":"Gong Y, Yao H, Liu X et al (2024) Computation and privacy protection for satellite-ground digital twin networks. IEEE transactions on communications 72(9):5532\u20135546. https:\/\/doi.org\/10.1109\/TCOMM.2024.3392795","DOI":"10.1109\/TCOMM.2024.3392795"},{"key":"2086_CR36","doi-asserted-by":"publisher","unstructured":"Li X, Lu Z, Yuan M et al (2024) Tradeoff of code estimation error rate and terminal gain in SCER attack. IEEE Trans Instrum Meas 73:1\u201312. https:\/\/doi.org\/10.1109\/TIM.2024.3406807","DOI":"10.1109\/TIM.2024.3406807"},{"key":"2086_CR37","doi-asserted-by":"publisher","unstructured":"Yang X, Chen J, Li D et al (2024) Functional-Coefficient quantile regression for panel data with latent group structure. J Bus Econ Stat 42(3):1026\u20131040. https:\/\/doi.org\/10.1080\/07350015.2023.2277172","DOI":"10.1080\/07350015.2023.2277172"},{"key":"2086_CR38","doi-asserted-by":"publisher","unstructured":"Jiang H, Ji P, Zhang T et al (2024). Two-factor authentication for keyless entry system via finger-induced vibrations. IEEE Trans Mob Comput 23(10):9708\u20139720. https:\/\/doi.org\/10.1109\/TMC.2024.3368331","DOI":"10.1109\/TMC.2024.3368331"},{"key":"2086_CR39","doi-asserted-by":"publisher","unstructured":"Gao H, Xin R, Chen P et al (2025) Memory-augment graph transformer based unsupervised detection model for identifying performance anomalies in highly-dynamic cloud environments. J Cloud Comput 14(1):40. https:\/\/doi.org\/10.1186\/s13677-025-00766-5","DOI":"10.1186\/s13677-025-00766-5"},{"key":"2086_CR40","doi-asserted-by":"publisher","unstructured":"Zhang M, Wei E, Berry R et al (2024) Age-dependent differential privacy. IEEE Trans Inf Theory 70(2):1300\u20131319. https:\/\/doi.org\/10.1109\/TIT.2023.3340147","DOI":"10.1109\/TIT.2023.3340147"},{"key":"2086_CR41","doi-asserted-by":"publisher","unstructured":"Yan Z, Hao P, Nardello M et al (2025) A generalizable load re cognition method in NILM based on transferable random forest. IEEE Trans Instrum Meas 74. https:\/\/doi.org\/10.1109\/TIM.2025.3570355","DOI":"10.1109\/TIM.2025.3570355"},{"key":"2086_CR42","doi-asserted-by":"publisher","unstructured":"Wu X, Zou B, Lu C et al (2025). Dynamic security computing framework with zero trust based on privacy domain prevention and control theory. IEEE J Sel Areas Commun 43(6):2266\u20132278. https:\/\/doi.org\/10.1109\/JSAC.2025.3560036","DOI":"10.1109\/JSAC.2025.3560036"},{"key":"2086_CR43","doi-asserted-by":"publisher","unstructured":"Cheng Y, Deng X, Li Y et al (2024) Tight incentive analysis of sybil attacks against the market equilibrium of resource exchange over general networks. Games Econ Behav 148:566\u2013610. https:\/\/doi.org\/10.1016\/j.geb.2024.10.009","DOI":"10.1016\/j.geb.2024.10.009"},{"key":"2086_CR44","doi-asserted-by":"publisher","unstructured":"Ali A, Almaiah MA, Hajjej F, Pasha MF, Fang OH, Khan R, Teo J, Zakarya M (2022) An industrial IoT-Based Blockchain-Enabled secure searchable encryption approach for healthcare systems using neural network. Sensors 22(2):572. https:\/\/doi.org\/10.3390\/s22020572","DOI":"10.3390\/s22020572"},{"key":"2086_CR45","doi-asserted-by":"publisher","unstructured":"Yang K (2024) How to prevent deception: A study of digital deception in \u201cvisual poverty\u201d livestream. New Media Soc 49:1. https:\/\/doi.org\/10.1177\/14614448241285443","DOI":"10.1177\/14614448241285443"},{"key":"2086_CR46","doi-asserted-by":"publisher","unstructured":"Almaiah MA, Ali A, Hajjej F, Pasha MF, Alohali MA (2022) A lightweight hybrid deep learning privacy preserving model for FC-Based industrial internet of medical things. Sensors 22(6):2112. https:\/\/doi.org\/10.3390\/s22062112","DOI":"10.3390\/s22062112"},{"key":"2086_CR47","doi-asserted-by":"publisher","unstructured":"MA Almaiah, F Hajjej, A Ali et al (2022) A novel hybrid trustworthy decentralized authenticationand data preservation model for digital healthcare IoT based CPS. https:\/\/doi.org\/10.3390\/s22041448","DOI":"10.3390\/s22041448"},{"key":"2086_CR48","doi-asserted-by":"publisher","unstructured":"Sun G, Li Y, Liao D et al (2018) Service function chain orchestration across multiple domains: A full mesh aggregation approach. IEEE Trans Netw Serv Manag 15(3):1175\u20131191. https:\/\/doi.org\/10.1109\/TNSM.2018.2861717","DOI":"10.1109\/TNSM.2018.2861717"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02086-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02086-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02086-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T06:39:31Z","timestamp":1760683171000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02086-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,20]]},"references-count":48,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["2086"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02086-6","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,20]]},"assertion":[{"value":"24 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"The committee of the University confirmed that all experimental protocols were approved by the organization.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"It is confirmed that the experiments follow the criteria of ethics approval and consent to participates.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical guidelines\/accordance"}},{"value":"No human subjects are harmed in this research, and we confirmed that all data shared with the participants The datasets generated during and\/or analyzed during the current study are available from the corresponding author upon reasonable request.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"Not applicable.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Permission to reproduce material from other sources"}},{"value":"Not applicable.","order":7,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent of publish"}}],"article-number":"270"}}