{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T11:05:53Z","timestamp":1771412753285,"version":"3.50.1"},"reference-count":73,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T00:00:00Z","timestamp":1770336000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T00:00:00Z","timestamp":1771372800000},"content-version":"vor","delay-in-days":12,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Comput Intell Syst"],"DOI":"10.1007\/s44196-025-01126-6","type":"journal-article","created":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T13:56:58Z","timestamp":1770386218000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Blockchain-Assisted Transformer CNN Framework with Optimal Feature Selection for Real-Time Digital Payment Fraud Detection"],"prefix":"10.1007","volume":"19","author":[{"given":"Himani","family":"Fnu","sequence":"first","affiliation":[]},{"given":"Mahamood Hussain","family":"Mirza","sequence":"additional","affiliation":[]},{"given":"Mahatma Reddy","family":"Marri","sequence":"additional","affiliation":[]},{"given":"Sangeeta","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Nitin","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Dominic Majak Deng","family":"Adol","sequence":"additional","affiliation":[]},{"given":"Rania M.","family":"Ghoniem","sequence":"additional","affiliation":[]},{"given":"Ruby","family":"Pant","sequence":"additional","affiliation":[]},{"given":"Salil","family":"Bharany","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,6]]},"reference":[{"key":"1126_CR1","doi-asserted-by":"crossref","unstructured":"Balaji, K. \"IoT in financial services innovations in banking and insurance.\" Managing customer-centric strategies in the digital landscape (2025): 75\u2013104.","DOI":"10.4018\/979-8-3693-5668-5.ch004"},{"issue":"5","key":"1126_CR2","doi-asserted-by":"publisher","DOI":"10.3390\/risks12050074","volume":"12","author":"K-A Aivaz","year":"2024","unstructured":"Aivaz, K.-A., Florea, I.O., Munteanu, I.: Economic fraud and associated risks: an integrated bibliometric analysis approach. Risks 12(5), 74 (2024)","journal-title":"Risks"},{"key":"1126_CR3","doi-asserted-by":"publisher","DOI":"10.1108\/CEMJ-10-2024-0297","author":"J G\u00f3rka","year":"2025","unstructured":"G\u00f3rka, J.: The rise of instant payments: a cross-country comparison. Central Eur. Manage. J. (2025). https:\/\/doi.org\/10.1108\/CEMJ-10-2024-0297","journal-title":"Central Eur. Manage. J."},{"key":"1126_CR4","unstructured":"Chy, M.K. \"Proactive fraud defense: machine learning\u2019s evolving role in protecting against online fraud.\" arXiv preprint arXiv:2410.20281 (2024)."},{"key":"1126_CR5","doi-asserted-by":"crossref","unstructured":"Shamoo, Y. \"Cybercrime investigation and fraud detection with AI.\" In: Digital Forensics in the Age of AI, pp. 83\u2013114. IGI Global Scientific Publishing, 2025.","DOI":"10.4018\/979-8-3373-0857-9.ch004"},{"issue":"04","key":"1126_CR6","doi-asserted-by":"publisher","DOI":"10.1142\/S242478632442009X","volume":"11","author":"K Garg","year":"2024","unstructured":"Garg, K.: Digital identities in the metaverse: privacy, security, and user authentication in virtual financial systems. Int. J. Financ. Eng. 11(04), 2442009 (2024)","journal-title":"Int. J. Financ. Eng."},{"key":"1126_CR7","doi-asserted-by":"publisher","first-page":"188174","DOI":"10.1109\/ACCESS.2024.3511272","volume":"12","author":"R Alami","year":"2024","unstructured":"Alami, R., Biswas, A., Shinde, V., Almogren, A., Rehman, A.U., Shaikh, T.: Blockchain enabled federated learning for detection of malicious internet of things nodes. IEEE Access 12, 188174\u2013188185 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3511272","journal-title":"IEEE Access"},{"issue":"2","key":"1126_CR8","doi-asserted-by":"publisher","first-page":"3805","DOI":"10.32604\/cmc.2025.067615","volume":"85","author":"A Mahboob","year":"2025","unstructured":"Mahboob, A., Rashad, M., Abbas, G., Mushtaq, Z., Mazhar, T., Rehman, A.U.: Fortifying industry 4.0 solar power systems: a blockchain-driven cybersecurity framework with immutable LightGBM. Comput. Mater. Contin. 85(2), 3805\u20133823 (2025). https:\/\/doi.org\/10.32604\/cmc.2025.067615","journal-title":"Comput. Mater. Contin."},{"key":"1126_CR9","doi-asserted-by":"publisher","first-page":"17982","DOI":"10.1109\/ACCESS.2024.3360868","volume":"12","author":"NS Musa","year":"2024","unstructured":"Musa, N.S., Mirza, N.M., Rafique, S.H., Abdallah, A.M., Murugan, T.: Machine learning and deep learning techniques for distributed denial of service anomaly detection in software defined networks\u2014current research solutions. IEEE Access 12, 17982\u201318011 (2024)","journal-title":"IEEE Access"},{"key":"1126_CR10","doi-asserted-by":"crossref","unstructured":"Vashishtha, L.K., Chattejee, K., Pant, P., Sahu, S.K., Mohapatra, D.P. \"Empowering software security: leveraging machine learning for anomaly detection and threat prevention.\"In: Boosting Software Development Using Machine Learning, pp. 217\u2013251. Springer, Cham, 2025.","DOI":"10.1007\/978-3-031-88188-6_10"},{"key":"1126_CR11","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-024-00685-x","volume":"13","author":"M Sajid","year":"2024","unstructured":"Sajid, M., Malik, K.R., Almogren, A., et al.: Enhancing intrusion detection: a hybrid machine and deep learning approach. J. Cloud Comput. 13, 123 (2024). https:\/\/doi.org\/10.1186\/s13677-024-00685-x","journal-title":"J. Cloud Comput."},{"issue":"1","key":"1126_CR12","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s11276-024-03742-0","volume":"31","author":"KAM Junaid","year":"2024","unstructured":"Junaid, K.A.M., Paulraj, D., Sethukarasi, T.: A comprehensive ensemble classification techniques detecting and managing concept drift in dynamic imbalanced data streams. Wireless Netw. 31(1), 19\u201330 (2024)","journal-title":"Wireless Netw."},{"issue":"7","key":"1126_CR13","doi-asserted-by":"publisher","DOI":"10.3390\/electronics14071394","volume":"14","author":"M Almutairi","year":"2025","unstructured":"Almutairi, M., Sheldon, F.T.: IoT\u2013cloud integration security: a survey of challenges, solutions, and directions. Electronics 14(7), 1394 (2025)","journal-title":"Electronics"},{"key":"1126_CR14","doi-asserted-by":"crossref","unstructured":"Olushola, A., and Joseph, M. \"Fraud detection using machine learning.\" ScienceOpen Preprints (2024).","DOI":"10.14293\/PR2199.000647.v1"},{"key":"1126_CR15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3418900","author":"L Jiao","year":"2024","unstructured":"Jiao, L., Shao, Y., Sun, L., Liu, F., Yang, S., Ma, W., Li, L., et al.: Advanced deep learning models for 6G: overview, opportunities and challenges. IEEE Access (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3418900","journal-title":"IEEE Access"},{"key":"1126_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s13177-024-00413-4","author":"S Dhanasekaran","year":"2024","unstructured":"Dhanasekaran, S., Gopal, D., Logeshwaran, J., Ramya, N., Salau, A.O.: Multi-model traffic forecasting in smart cities using graph neural networks and transformer-based multi-source visual fusion for intelligent transportation management. Int. J. Intell. Transp. Syst. Res. (2024). https:\/\/doi.org\/10.1007\/s13177-024-00413-4","journal-title":"Int. J. Intell. Transp. Syst. Res."},{"key":"1126_CR17","doi-asserted-by":"crossref","unstructured":"Chougule, N. S., Chetan J. A., and Rashmi D. \"Using AWS SageMaker to deploy ML credit card fraud detection model.\" In: 2024 5th International Conference on Mobile Computing and Sustainable Informatics (ICMCSI), pp. 150\u2013156. IEEE, 2024.","DOI":"10.1109\/ICMCSI61536.2024.00029"},{"key":"1126_CR18","unstructured":"Mahida, A., Pradeep C., and Hrushikesh D. \"Enhancing fraud detection in real time using DataOps on elastic platforms.\" (2024)."},{"issue":"2","key":"1126_CR19","doi-asserted-by":"publisher","first-page":"155","DOI":"10.61797\/ijaaiml.v4i2.371","volume":"4","author":"S Amirineni","year":"2024","unstructured":"Amirineni, S.: Leveraging machine learning, cloud computing, and artificial intelligence for fraud detection and prevention in insurance: a scalable approach to data-driven insights. Int. J. Autom Artif Intell Mach Learn 4(2), 155\u2013172 (2024)","journal-title":"Int. J. Autom Artif Intell Mach Learn"},{"issue":"1","key":"1126_CR20","doi-asserted-by":"publisher","first-page":"39","DOI":"10.48175\/IJARSCT-23608","volume":"5","author":"R Chourasia","year":"2025","unstructured":"Chourasia, R.: RTASM: an AI-driven real-time adaptive streaming model for zero-latency big data processing. Int. J. Adv. Res. Sci. Commun. Technol. 5(1), 39\u201348 (2025)","journal-title":"Int. J. Adv. Res. Sci. Commun. Technol."},{"key":"1126_CR21","unstructured":"Far, A.Z., Far, M.Z., Gharibzadeh, S., Naeini, H.K., Amini, L., Zangeneh, S., Rahimi, M. and Asadi, S., \u201cArtificial intelligence for secured information systems in smart cities: Collaborative IoT computing with deep reinforcement learning and blockchain.\u201d arXiv preprint arXiv:2409.16444 (2024)."},{"key":"1126_CR22","doi-asserted-by":"publisher","DOI":"10.1109\/TMLCN.2025.3564912","author":"MAM Farzaan","year":"2025","unstructured":"Farzaan, M.A.M., Ghanem, M.C., El-Hajjar, A., Ratnayake, D.N.: AI-powered system for an efficient and effective cyber incidents detection and response in cloud environments. IEEE Trans. Mach. Learn. Commun. Netw. (2025). https:\/\/doi.org\/10.1109\/TMLCN.2025.3564912","journal-title":"IEEE Trans. Mach. Learn. Commun. Netw."},{"issue":"4","key":"1126_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-025-11108-x","volume":"58","author":"E Edozie","year":"2025","unstructured":"Edozie, E., Shuaibu, A.N., Sadiq, B.O., John, U.K.: Artificial intelligence advances in anomaly detection for telecom networks. Artif. Intell. Rev. 58(4), 100 (2025)","journal-title":"Artif. Intell. Rev."},{"issue":"7","key":"1126_CR24","doi-asserted-by":"publisher","DOI":"10.3390\/electronics14071430","volume":"14","author":"G Rampone","year":"2025","unstructured":"Rampone, G., Ivaniv, T., Rampone, S.: A hybrid federated learning framework for privacy-preserving near-real-time intrusion detection in IoT environments. Electronics 14(7), 1430 (2025)","journal-title":"Electronics"},{"key":"1126_CR25","doi-asserted-by":"crossref","unstructured":"Farzaan, M.A.M., Ghanem, M. C., El-Hajjar, A., and Ratnayake, D. N. \"AI-enabled system for efficient and effective cyber incident detection and response in cloud environments.\" arXiv preprint arXiv:2404.05602 (2024).","DOI":"10.1109\/TMLCN.2025.3564912"},{"issue":"10","key":"1126_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-024-10908-x","volume":"57","author":"M Pathak","year":"2024","unstructured":"Pathak, M., Mishra, K.N., Singh, S.P.: Securing data and preserving privacy in cloud IoT-based technologies: an analysis of assessing threats and developing effective safeguard. Artif. Intell. Rev. 57(10), 269 (2024)","journal-title":"Artif. Intell. Rev."},{"issue":"5","key":"1126_CR27","doi-asserted-by":"publisher","DOI":"10.3390\/electronics14051010","volume":"14","author":"C Kim","year":"2025","unstructured":"Kim, C., Cho, K., Joe, I.: Artificial intelligence-based fault diagnosis for steam traps using statistical time series features and a transformer encoder-decoder model. Electronics 14(5), 1010 (2025)","journal-title":"Electronics"},{"key":"1126_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3536638","author":"M Babar","year":"2025","unstructured":"Babar, M., Tariq, M.U., Ullah, Z., Arif, F., Khan, Z., Qureshi, B.: An efficient and hybrid deep learning-driven model to enhance security and performance of healthcare internet of things. IEEE Access (2025). https:\/\/doi.org\/10.1109\/ACCESS.2025.3536638","journal-title":"IEEE Access"},{"key":"1126_CR29","doi-asserted-by":"crossref","unstructured":"Tripathi, Ayush, Prashant Upadhyay, and Pawan Kumar Goel. \"Deep Learning for Anomaly Detection in Industrial Networks.\" In AI-Enhanced Cybersecurity for Industrial Automation, pp. 103\u2013130. IGI Global Scientific Publishing, 2025.","DOI":"10.4018\/979-8-3373-3241-3.ch006"},{"key":"1126_CR30","doi-asserted-by":"crossref","unstructured":"Barua, Biman, and M. Shamim Kaiser. \"A Next-Generation Approach to Airline Reservations: Integrating Cloud Microservices with AI and Blockchain for Enhanced Operational Performance.\" arXiv preprint arXiv:2411.06538 (2024).","DOI":"10.1049\/blc2.70020"},{"key":"1126_CR31","doi-asserted-by":"publisher","first-page":"137188","DOI":"10.1109\/ACCESS.2023.3339226","volume":"11","author":"AA Almazroi","year":"2023","unstructured":"Almazroi, A.A., Ayub, N.: Online payment fraud detection model using machine learning techniques. IEEE Access 11, 137188\u2013137203 (2023)","journal-title":"IEEE Access"},{"key":"1126_CR32","doi-asserted-by":"crossref","unstructured":"K.G.Al-Hashedi and P. Magalingam, \u2018\u2018Financial fraud detection applying data mining techniques: A comprehensive review from 2009 to 2019,\u2019\u2019 IEEE Access, vol. 40, 2021, Art. no. 100402.","DOI":"10.1016\/j.cosrev.2021.100402"},{"issue":"5","key":"1126_CR33","doi-asserted-by":"publisher","first-page":"1304","DOI":"10.1109\/TCSS.2020.3017013","volume":"7","author":"L Zheng","year":"2020","unstructured":"Zheng, L., Liu, G., Yan, C., Jiang, C., Zhou, M., Li, M.: Improved TrAdaBoost and its application to transaction fraud detection. IEEE Trans. Comput. Soc. Syst. 7(5), 1304\u20131316 (2020)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"18","key":"1126_CR34","doi-asserted-by":"publisher","DOI":"10.3390\/s23187788","volume":"23","author":"J Chung","year":"2023","unstructured":"Chung, J., Lee, K.: Credit card fraud detection: an improved strategy for high recall using KNN, LDA, and linear regression. Sensors 23(18), 7788 (2023)","journal-title":"Sensors"},{"issue":"2","key":"1126_CR35","doi-asserted-by":"publisher","first-page":"917","DOI":"10.14419\/ijet.v7i2.9356","volume":"7","author":"SV Suryanarayana","year":"2018","unstructured":"Suryanarayana, S.V., Balaji, G.N., Rao, G.V.: Machine learning approaches for credit card fraud detection. International Journal of Engineering & Technology 7(2), 917 (2018)","journal-title":"International Journal of Engineering & Technology"},{"key":"1126_CR36","doi-asserted-by":"crossref","unstructured":"H.Fanai and H.Abbasimehr, \u2018\u2018A novel combined approach based on deep autoencoder and deep classifiers for credit card fraud detection,\u2019\u2019 Expert Syst. Appl., vol. 217, May 2023, Art. no. 119562.","DOI":"10.1016\/j.eswa.2023.119562"},{"key":"1126_CR37","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.neunet.2020.02.016","volume":"126","author":"PR Vlachas","year":"2020","unstructured":"Vlachas, P.R., Pathak, J., Hunt, B.R., Sapsis, T.P., Girvan, M., Ott, E., Koumoutsakos, P.: Backpropagation algorithms and reservoir computing in recurrent neural networks for the forecasting of complex spatiotemporal dynamics. Neural Netw. 126, 191\u2013217 (2020)","journal-title":"Neural Netw."},{"key":"1126_CR38","doi-asserted-by":"publisher","DOI":"10.1002\/jat.4803","author":"FM Mustafa","year":"2025","unstructured":"Mustafa, F.M., Al\u2010Hussainy, A.F., Doshi, H., Yadav, A., Rekha, M.M., Kundlas, M., Sabarivani, A., Kubaev, A., Taher, S.G., Alwan, M., Jawad, M.: TabNet and TabTransformer: novel deep learning models for chemical toxicity prediction in comparison with machine learning. J. Appl. Toxicol. (2025). https:\/\/doi.org\/10.1002\/jat.4803","journal-title":"J. Appl. Toxicol."},{"key":"1126_CR39","first-page":"2902","volume":"35","author":"Z Wang","year":"2022","unstructured":"Wang, Z., Sun, J.: Transtab: learning transferable tabular transformers across tables. Adv. Neural. Inf. Process. Syst. 35, 2902\u20132915 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"1126_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.112782","volume":"309","author":"B He","year":"2025","unstructured":"He, B., Zhao, R., Tang, D.: CABiLSTM-BERT: aspect-based sentiment analysis model based on deep implicit feature extraction. Knowl. Based Syst. 309, 112782 (2025)","journal-title":"Knowl. Based Syst."},{"key":"1126_CR41","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2025.3583893","author":"H Siranjeevi","year":"2025","unstructured":"Siranjeevi, H., Venkatraman, S., Raja, S.P.: EBPGA: extractive text summarization using binary particle swarm optimization and masked genetic algorithm. IEEE Trans. Comput. Soc. Syst. (2025). https:\/\/doi.org\/10.1109\/TCSS.2025.3583893","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"11","key":"1126_CR42","first-page":"9287","volume":"84","author":"D Paramasivam","year":"2025","unstructured":"Paramasivam, D., Sivaji, S., Dayanandan, V.S., Alqahtani, A.S.: Iot cryptography with privacy-preserving elgamal public key cryptosystem using oppositional artificial flora optimization algorithm. Multimedia Tools Appl. 84(11), 9287\u20139308 (2025)","journal-title":"Multimedia Tools Appl."},{"key":"1126_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.ibiod.2025.106153","volume":"204","author":"X Ke","year":"2025","unstructured":"Ke, X., Liao, Z.L., Yu, H., Zhang, Y.C., Zhou, S.P., Xue, Y.P., Zheng, Y.G.: Targeted construction of artificial multicellular SND microbial communities and high ammonia-nitrogen wastewater treatment efficiency analysis. Int. Biodeterior. Biodegrad. 204, 106153 (2025)","journal-title":"Int. Biodeterior. Biodegrad."},{"issue":"2","key":"1126_CR44","volume":"25","author":"MJ Diamantopoulou","year":"2025","unstructured":"Diamantopoulou, M.J., Georgakis, A., Progios, M.: Optimizing pine tree stem volume models using artificial neural networks with minimal input variables. Oper. Res. 25(2), 42 (2025)","journal-title":"Oper. Res."},{"issue":"3","key":"1126_CR45","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.70027","volume":"8","author":"R Basha","year":"2025","unstructured":"Basha, R., Pathak, P., Sudha, M., Soumya, K.V., Arockia Venice, J.: Optimization of quantum dilated convolutional neural networks: image recognition with quantum computing. Internet Technol. Lett. 8(3), e70027 (2025)","journal-title":"Internet Technol. Lett."},{"issue":"1","key":"1126_CR46","doi-asserted-by":"publisher","first-page":"15640","DOI":"10.1038\/s41598-025-98731-4","volume":"15","author":"V Shariff","year":"2025","unstructured":"Shariff, V., Paritala, C., Ankala, K.M.: Optimizing non small cell lung cancer detection with convolutional neural networks and differential augmentation. Sci. Rep. 15(1), 15640 (2025)","journal-title":"Sci. Rep."},{"key":"1126_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2025.111472","volume":"163","author":"Z Li","year":"2025","unstructured":"Li, Z., Yu, Y., Yin, C., Shi, Y.: AdaNet: a competitive adaptive convolutional neural network for spectral information identification. Pattern Recognit. 163, 111472 (2025)","journal-title":"Pattern Recognit."},{"issue":"2","key":"1126_CR48","first-page":"1","volume":"3","author":"W Ren","year":"2025","unstructured":"Ren, W., Xiao, X., Xu, J., Chen, H., Zhang, Y., Zhang, J.: Trojan virus detection and classification based on graph convolutional neural network algorithm. J. Ind. Eng. Appl. Sci. 3(2), 1\u20135 (2025)","journal-title":"J. Ind. Eng. Appl. Sci."},{"key":"1126_CR49","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.121317","volume":"686","author":"H Zhuang","year":"2025","unstructured":"Zhuang, H., Lin, Z., Yang, Y., Toh, K.A.: An analytic formulation of convolutional neural network learning for pattern recognition. Inf. Sci. 686, 121317 (2025)","journal-title":"Inf. Sci."},{"key":"1126_CR50","first-page":"100902","volume":"47","author":"Z Lei","year":"2025","unstructured":"Lei, Z., de la Torre, L., Ma\u00f1as-\u00c1lvarez, F.J., Hu, W.: Blockchain-based cloud controllers for reliable networked control systems. J. Ind. Inf. Integr. 47, 100902 (2025)","journal-title":"J. Ind. Inf. Integr."},{"key":"1126_CR51","doi-asserted-by":"crossref","unstructured":"Wang, G., Liu, Q., Yu, Z., Zhang, H. and Dong, A., 2025. BCE-PPDS: Blockchain-based cloud-edge collaborative privacy-preserving data sharing scheme for IoT. Future Generation Computer Systems, p.107922.","DOI":"10.1016\/j.future.2025.107922"},{"issue":"19","key":"1126_CR52","doi-asserted-by":"publisher","first-page":"31206","DOI":"10.1109\/JIOT.2024.3416086","volume":"11","author":"Q Cai","year":"2024","unstructured":"Cai, Q., Chen, J., Luo, D., Sun, G., Yu, H., Guizani, M.: Deter-Pay: a deterministic routing protocol in concurrent payment channel network. IEEE Internet Things J. 11(19), 31206\u201331220 (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3416086","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"1126_CR53","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-025-01174-x","volume":"12","author":"K Zhang","year":"2025","unstructured":"Zhang, K., Wang, H., Chen, M., Chen, X., Liu, L., Geng, Q., Zhou, Y.: Leveraging machine learning to proactively identify phishing campaigns before they strike. J. Big Data 12(1), 124 (2025). https:\/\/doi.org\/10.1186\/s40537-025-01174-x","journal-title":"J. Big Data"},{"key":"1126_CR54","doi-asserted-by":"publisher","unstructured":"M. Balayet Hossain Sakil\u00a0et al., \"Enhancing Medicare Fraud Detection With a CNN-Transformer-XGBoost Framework and Explainable AI,\" in\u00a0IEEE Access, vol. 13, pp. 79609\u201379622, 2025, https:\/\/doi.org\/10.1109\/ACCESS.2025.3562577","DOI":"10.1109\/ACCESS.2025.3562577"},{"issue":"6","key":"1126_CR55","doi-asserted-by":"publisher","first-page":"3727","DOI":"10.1109\/TSC.2024.3411449","volume":"17","author":"J Zhang","year":"2024","unstructured":"Zhang, J., Sui, H., Sun, X., Ge, C., Zhou, L., Susilo, W.: Grabphisher: phishing scams detection in Ethereum via temporally evolving GNNs. IEEE Trans. Serv. Comput. 17(6), 3727\u20133741 (2024). https:\/\/doi.org\/10.1109\/TSC.2024.3411449","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"1","key":"1126_CR56","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/TETCI.2024.3425282","volume":"9","author":"J Zhu","year":"2025","unstructured":"Zhu, J., Jin, J., Chen, C., Wu, L., Lu, M., Ouyang, A.: A new-type zeroing neural network model and its application in dynamic cryptography. IEEE Trans. Emerg. Top. Comput. Intell. 9(1), 176\u2013191 (2025). https:\/\/doi.org\/10.1109\/TETCI.2024.3425282","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"1126_CR57","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2024.104210","volume":"102","author":"G Cao","year":"2024","unstructured":"Cao, G., Wang, Y., Zhu, H., Lou, Z., Yu, L.: Transferable adversarial attack on image tampering localization. J. Vis. Commun. Image Represent. 102, 104210 (2024). https:\/\/doi.org\/10.1016\/j.jvcir.2024.104210","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"2","key":"1126_CR58","doi-asserted-by":"publisher","first-page":"1602","DOI":"10.1109\/TCSS.2023.3240968","volume":"11","author":"H Teng","year":"2024","unstructured":"Teng, H., Wang, C., Yang, Q., Chen, X., Li, R.: Leveraging adversarial augmentation on imbalance data for online trading fraud detection. IEEE Trans. Comput. Social Syst. 11(2), 1602\u20131614 (2024)","journal-title":"IEEE Trans. Comput. Social Syst."},{"key":"1126_CR59","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/s10791-025-09602-5","volume":"28","author":"D Chakraborty","year":"2025","unstructured":"Chakraborty, D.: Bill safe: intelligent forgery detection with CNN and upgrade sand cat swarm optimization. Discov. Comput. 28, 84 (2025). https:\/\/doi.org\/10.1007\/s10791-025-09602-5","journal-title":"Discov. Comput."},{"issue":"1","key":"1126_CR60","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-025-00766-5","volume":"14","author":"H Gao","year":"2025","unstructured":"Gao, H., Xin, R., Chen, P., Li, X., Lu, N., You, P.: Memory-augment graph transformer based unsupervised detection model for identifying performance anomalies in highly-dynamic cloud environments. J. Cloud Comput. 14(1), 40 (2025). https:\/\/doi.org\/10.1186\/s13677-025-00766-5","journal-title":"J. Cloud Comput."},{"issue":"1","key":"1126_CR61","first-page":"1","volume":"192","author":"T Shahana","year":"2023","unstructured":"Shahana, T., Lavanya, V., Bhat, A.: State of the art in financial statement fraud detection: a systematic review. Technol. Forecast. Soc. Change. 192(1), 1\u201324 (2023)","journal-title":"Technol. Forecast. Soc. Change."},{"key":"1126_CR62","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/s44227-025-00072-1","volume":"13","author":"J Singh","year":"2025","unstructured":"Singh, J., Bharany, S., Rani, S., et al.: A systematic review of blockchain, AI, and cloud integration for secure digital ecosystems. Int. J. Netw. Distrib. Comput. 13, 28 (2025). https:\/\/doi.org\/10.1007\/s44227-025-00072-1","journal-title":"Int. J. Netw. Distrib. Comput."},{"issue":"6","key":"1126_CR63","doi-asserted-by":"publisher","first-page":"2865","DOI":"10.1109\/TCYB.2025.3558941","volume":"55","author":"C Huang","year":"2025","unstructured":"Huang, C., Gao, C., Li, M., Li, Y., Wang, X., Jiang, Y., Huang, X.: Correlation information enhanced graph anomaly detection via hypergraph transformation. IEEE Trans. Cybern. 55(6), 2865\u20132878 (2025). https:\/\/doi.org\/10.1109\/TCYB.2025.3558941","journal-title":"IEEE Trans. Cybern."},{"key":"1126_CR64","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-01223-8","volume":"15","author":"SM Darwish","year":"2025","unstructured":"Darwish, S.M., Salama, A.I., Elzoghabi, A.A.: Intelligent approach to detecting online fraudulent trading with solution for imbalanced data in fintech forensics. Sci. Rep. 15, 17983 (2025). https:\/\/doi.org\/10.1038\/s41598-025-01223-8","journal-title":"Sci. Rep."},{"issue":"5","key":"1126_CR65","doi-asserted-by":"publisher","first-page":"243","DOI":"10.62051\/16r3aa10","volume":"5","author":"E Pan","year":"2024","unstructured":"Pan, E.: Machine learning in financial transaction fraud detection and prevention. Trans. Econ. Bus. Manag. Res. 5(5), 243\u2013249 (2024)","journal-title":"Trans. Econ. Bus. Manag. Res."},{"key":"1126_CR66","doi-asserted-by":"crossref","unstructured":"Rajendran, S., John, A., Suhas, B., & Sahana, B. (2023). Role of ML and DL in detecting fraudulent transactions. In Artificial Intelligence for Societal Issues (pp. 59\u201382). Springer International Publishing.","DOI":"10.1007\/978-3-031-12419-8_4"},{"issue":"5","key":"1126_CR67","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3641857","volume":"18","author":"S Khodabandehlou","year":"2024","unstructured":"Khodabandehlou, S., Golpayegani, A., FiFrauD: Unsupervised financial fraud detection in dynamic graph streams. ACM Trans. Knowl. Discov. Data 18(5), 1\u201329 (2024)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"1126_CR68","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsm.2025.08.002","author":"Y Chen","year":"2025","unstructured":"Chen, Y., Zhao, C., Xu, Y., Nie, C., Zhang, Y.: Deep learning in financial fraud detection: innovations, challenges, and applications. Data Science and Management (2025). https:\/\/doi.org\/10.1016\/j.dsm.2025.08.002","journal-title":"Data Science and Management"},{"key":"1126_CR69","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103821","volume":"141","author":"M Zhong","year":"2024","unstructured":"Zhong, M., Lin, M., Zhang, C., Xu, Z.: A survey on graph neural networks for intrusion detection systems: methods, trends and challenges. Comput. Secur. 141, 103821 (2024)","journal-title":"Comput. Secur."},{"issue":"19","key":"1126_CR70","doi-asserted-by":"publisher","DOI":"10.3390\/s22197162","volume":"22","author":"T Ashfaq","year":"2022","unstructured":"Ashfaq, T., Khalid, R., Yahaya, A.S., Aslam, S., Azar, A.T., Alsafari, S., Hameed, I.A.: A machine learning and blockchain based efficient fraud detection mechanism. Sensors 22(19), 7162 (2022). https:\/\/doi.org\/10.3390\/s22197162","journal-title":"Sensors"},{"key":"1126_CR71","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103516","volume":"135","author":"M Zhong","year":"2023","unstructured":"Zhong, M., Lin, M., He, Z.: Dynamic multi-scale topological representation for enhancing network intrusion detection. Comput. Secur. 135, 103516 (2023)","journal-title":"Comput. Secur."},{"key":"1126_CR72","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.aej.2025.05.030","volume":"127","author":"W Song","year":"2025","unstructured":"Song, W., Zhu, X., Ren, S., Tan, W., Peng, Y.: A hybrid blockchain and machine learning approach for intrusion detection system in Industrial Internet of Things. Alex. Eng. J. 127, 619\u2013627 (2025). https:\/\/doi.org\/10.1016\/j.aej.2025.05.030","journal-title":"Alex. Eng. J."},{"key":"1126_CR73","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-10045-7","volume":"15","author":"H Wei","year":"2025","unstructured":"Wei, H., Zhang, Y.: Research on the digital transaction model of the sports industry chain based on blockchain technology. Sci. Rep. 15, 25131 (2025). https:\/\/doi.org\/10.1038\/s41598-025-10045-7","journal-title":"Sci. Rep."}],"container-title":["International Journal of Computational Intelligence Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44196-025-01126-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44196-025-01126-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44196-025-01126-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T10:20:50Z","timestamp":1771410050000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44196-025-01126-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,6]]},"references-count":73,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["1126"],"URL":"https:\/\/doi.org\/10.1007\/s44196-025-01126-6","relation":{},"ISSN":["1875-6883"],"issn-type":[{"value":"1875-6883","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,6]]},"assertion":[{"value":"10 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"No animals or human subjects were involved in this study. The study utilized publicly available datasets, and all methods were carried out in accordance with relevant guidelines and regulations.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}],"article-number":"70"}}