{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T17:47:29Z","timestamp":1777312049065,"version":"3.51.4"},"reference-count":49,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Standards &amp; Interfaces"],"published-print":{"date-parts":[[2026,8]]},"DOI":"10.1016\/j.csi.2026.104166","type":"journal-article","created":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T15:43:10Z","timestamp":1776354190000},"page":"104166","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["SCWO-SNN: Snow carpet weaver optimization based spiking neural network for fraud detection in UPI transactions using federated learning"],"prefix":"10.1016","volume":"98","author":[{"given":"Chandra Sekhar","family":"Kolli","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Veeraraghavan","family":"Jagannathan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dasaradha Ramayya","family":"Lanka","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ch","family":"Rajyalakshmi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vijaya Kumar Reddy","family":"Radha","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vadisena Venkata Krishna","family":"Reddy","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/j.csi.2026.104166_bib0001","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2024.3394528","article-title":"Transparency and privacy: the role of explainable ai and federated learning in financial fraud detection","author":"Awosika","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.csi.2026.104166_bib0002","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-90022-9_23","article-title":"Kyber on ARM64: compact implementations of Kyber on 64-bit ARM Cortex-A processors","volume":"399","author":"Sanal","year":"2021","journal-title":"Secur. Privacy Commun. Netw."},{"issue":"5","key":"10.1016\/j.csi.2026.104166_bib0003","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1109\/TDSC.2017.2723891","article-title":"Supersingular isogeny Diffie-Hellman key exchange on 64-bit ARM","volume":"16","author":"Jalali","year":"2017","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.csi.2026.104166_bib0004","first-page":"26","article-title":"Reviews research on applying machine learning techniques to reduce false positives for network intrusion detection systems","volume":"2023","author":"Rajora","year":"2023","journal-title":"Babylonian J. Artif. Intell."},{"key":"10.1016\/j.csi.2026.104166_bib0005","series-title":"Proceedings of the 15th ACM International Conference on Computing Frontiers","article-title":"Comparative realization of error detection schemes for implementations of mixcolumns in lightweight cryptography","author":"Aghaie","year":"2018"},{"issue":"17","key":"10.1016\/j.csi.2026.104166_bib0006","doi-asserted-by":"crossref","first-page":"13941","DOI":"10.1007\/s00521-020-04797-8","article-title":"Wheat crop yield prediction using new activation functions in neural network","volume":"32","author":"Bhojani","year":"2020","journal-title":"Neural Comput. Appl."},{"issue":"3","key":"10.1016\/j.csi.2026.104166_bib0007","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1016\/j.dss.2010.08.008","article-title":"Data mining for credit card fraud: a comparative study","volume":"50","author":"Bhattacharyya","year":"2011","journal-title":"Decis. Support Syst."},{"key":"10.1016\/j.csi.2026.104166_bib0008","series-title":"2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","first-page":"2365","article-title":"Give and take: federated transfer learning for industrial IoT network intrusion detection","author":"Rajesh","year":"2023"},{"key":"10.1016\/j.csi.2026.104166_bib0009","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2024.110424","article-title":"Federated learning for medical image analysis: a survey","author":"Guan","year":"2024","journal-title":"Pattern Recognit."},{"issue":"4","key":"10.1016\/j.csi.2026.104166_bib0010","doi-asserted-by":"crossref","first-page":"1144","DOI":"10.1109\/TCSI.2013.2283691","article-title":"Efficient algorithm and architecture for elliptic curve cryptography for extremely constrained secure applications","volume":"61","author":"Azarderakhsh","year":"2014","journal-title":"IEEE Trans. Circuits Syst."},{"issue":"2","key":"10.1016\/j.csi.2026.104166_bib0011","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1109\/TR.2022.3216014","article-title":"Error detection constructions for ITA finite field inversions over GF(2m) on FPGA using CRC and hamming codes","volume":"72","author":"Cintas-Canto","year":"2023","journal-title":"IEEE Trans. Reliab."},{"key":"10.1016\/j.csi.2026.104166_bib0012","doi-asserted-by":"crossref","first-page":"158","DOI":"10.58496\/BJAI\/2024\/017","article-title":"Enhancing security with AI-driven hybrid machine learning and neural network-based intrusion detection system","volume":"2024","author":"Nay","year":"2024","journal-title":"Babylonian J. Artif. Intell."},{"key":"10.1016\/j.csi.2026.104166_bib0013","series-title":"2006 21st IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems","article-title":"Parity-based fault detection architecture of S-box for advanced encryption standard","author":"Mozaffari-Kermani","year":"2006"},{"key":"10.1016\/j.csi.2026.104166_bib0014","doi-asserted-by":"crossref","first-page":"110","DOI":"10.70470\/SHIFRA\/2025\/007","article-title":"An integrated federated learning framework with optimization for industrial IoT intrusion detection","volume":"2025","author":"Ali","year":"2025","journal-title":"SHIFRA"},{"issue":"10","key":"10.1016\/j.csi.2026.104166_bib0015","doi-asserted-by":"crossref","first-page":"1750","DOI":"10.1109\/TCAD.2017.2661811","article-title":"Reliable hardware architectures for cryptographic block ciphers LED and HIGHT","volume":"36","author":"Subramanian","year":"2017","journal-title":"IEEE Trans. Computer-Aided Des. Integr. Circuits Syst."},{"key":"10.1016\/j.csi.2026.104166_bib0016","series-title":"Progress in Cryptology \u2013 INDOCRYPT","article-title":"Fast Hardware Architectures for Supersingular Isogeny Die-Hellman Key Exchange on FPGA","author":"Koziel","year":"2016"},{"issue":"09","key":"10.1016\/j.csi.2026.104166_bib0017","first-page":"6935","article-title":"Opportunities and challenges of E-payment system in India","volume":"5","author":"Sujith","year":"2017","journal-title":"Int. J. Sci. Res. Manag. (IJSRM)"},{"key":"10.1016\/j.csi.2026.104166_bib0018","first-page":"7","article-title":"Role of UPI application usage and mitigation of payment transaction frauds: an empirical study","author":"Edburg","year":"2024","journal-title":"mdim J. Manag. Rev."},{"issue":"3","key":"10.1016\/j.csi.2026.104166_bib0019","doi-asserted-by":"crossref","first-page":"518","DOI":"10.13189\/ujaf.2021.090326","article-title":"Unified Payment Interface (UPI): a digital innovation and its impact on financial inclusion and economic development","volume":"9","author":"Rastogi","year":"2021","journal-title":"Univers. J. Account. Finance"},{"issue":"1","key":"10.1016\/j.csi.2026.104166_bib0020","doi-asserted-by":"crossref","first-page":"29","DOI":"10.5958\/2322-0465.2017.00004.1","article-title":"Unified payment interface (UPI): a cashless Indian e-transaction process","volume":"5","author":"Mohapatra","year":"2017","journal-title":"Int. J. Appl. Sci. Eng."},{"key":"10.1016\/j.csi.2026.104166_bib0021","series-title":"2019 Amity International Conference on Artificial Intelligence (AICAI)","first-page":"1","article-title":"UPI based mobile banking applications\u2013security analysis and enhancements","author":"Lakshmi","year":"2019"},{"key":"10.1016\/j.csi.2026.104166_bib0022","series-title":"Challenges in Information, Communication and Computing Technology","first-page":"755","article-title":"UPI fraud detection using machine learning","author":"Jagadeesan","year":"2025"},{"issue":"7","key":"10.1016\/j.csi.2026.104166_bib0023","doi-asserted-by":"crossref","first-page":"1105","DOI":"10.1109\/TCAD.2014.2307002","article-title":"Efficient and concurrent reliable realization of the secure cryptographic SHA-3 algorithm","volume":"33","author":"Bayat-Sarmadi","year":"2014","journal-title":"IEEE Trans. Computer-Aided Des. Integr. Circuits Syst."},{"key":"10.1016\/j.csi.2026.104166_bib0024","unstructured":"Mozaffari-Kermani, M., Azarderakhsh, R. and Mirakhorli, M., \u201cEducation and research integration of emerging multidisciplinary medical devices security\u201d, 2016."},{"key":"10.1016\/j.csi.2026.104166_bib0025","series-title":"EEE Nordic Circuits and Systems Conference (NorCAS)","first-page":"1","article-title":"Reliable code-based post-quantum cryptographic algorithms through fault detection on FPGA","author":"Cintas-Canto","year":"2023"},{"key":"10.1016\/j.csi.2026.104166_bib0026","first-page":"7","article-title":"Role of UPI application usage and mitigation of payment transaction frauds: an empirical study","author":"Edburg","year":"2024","journal-title":"MDIM J. Manag. Rev. Pract."},{"key":"10.1016\/j.csi.2026.104166_bib0027","doi-asserted-by":"crossref","first-page":"29841","DOI":"10.1007\/s11042-023-16807-7","article-title":"Crop yield prediction in India based on mayfly optimization empowered attention-bi-directional long short-term memory (LSTM)","volume":"83","author":"Krishna","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.csi.2026.104166_bib0028","unstructured":"Ramakrishnan, M.R., Vanisri, S. and Yuvalakshmi, D., \u201cUnified payment interface seamless transaction using RNN model\u201d, vol. 4, no. 5, pp. 1279\u20131283, 2024."},{"issue":"1","key":"10.1016\/j.csi.2026.104166_bib0029","first-page":"321","article-title":"Toward efficient credit card fraud detection: leveraging quantum neural networks and modified feature selection techniques","volume":"5","author":"Deepa","year":"2025","journal-title":"J. Mach. Comput."},{"key":"10.1016\/j.csi.2026.104166_bib0030","doi-asserted-by":"crossref","unstructured":"Gupta, Y., Saxena, N. and Kumar, K., \u201cUPI fraud detection using machine learning\u201d vol. 6, pp. 29\u201334, 2024.","DOI":"10.35629\/5252-06102934"},{"issue":"1","key":"10.1016\/j.csi.2026.104166_bib0031","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-020-76635-9","article-title":"Early and accurate detection and diagnosis of heart disease using intelligent computational model","volume":"10","author":"Muhammad","year":"2020","journal-title":"Sci. Rep."},{"key":"10.1016\/j.csi.2026.104166_bib0032","doi-asserted-by":"crossref","first-page":"8441","DOI":"10.1007\/s12652-020-02578-8","article-title":"Badminton match outcome prediction model using Na\u00efve Bayes and feature weighting technique","volume":"12","author":"Sharma","year":"2021","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"issue":"11","key":"10.1016\/j.csi.2026.104166_bib0033","doi-asserted-by":"crossref","first-page":"6231","DOI":"10.1007\/s00521-023-09410-2","article-title":"Federated learning model for credit card fraud detection with data balancing techniques","volume":"36","author":"Abdul Salam","year":"2024","journal-title":"Neural Comput. Appl."},{"key":"10.1016\/j.csi.2026.104166_bib0034","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2024.3491175","article-title":"A credit card fraud detection algorithm based on SDT and federated learning","author":"Tang","year":"2024","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.csi.2026.104166_bib0035","first-page":"138","article-title":"Deep Fraud Net: a deep learning approach for cyber security and financial fraud detection and classification","volume":"13","author":"Udayakumar","year":"2023","journal-title":"J. Internet Serv. Inf. Secur."},{"key":"10.1016\/j.csi.2026.104166_bib0036","series-title":"arXiv preprint","article-title":"Enhancing trust and safety in digital payments: an LLM-powered approach","author":"Dahiphale","year":"2024"},{"issue":"16","key":"10.1016\/j.csi.2026.104166_bib0037","doi-asserted-by":"crossref","first-page":"3169","DOI":"10.3390\/electronics13163169","article-title":"FedGAT-DCNN: advanced credit card fraud detection using federated learning, graph attention networks, and dilated convolutions","volume":"13","author":"Li","year":"2024","journal-title":"Electronics"},{"issue":"1","key":"10.1016\/j.csi.2026.104166_bib0038","first-page":"31","article-title":"UPI fraud detection using machine learning","volume":"16","author":"Swathi","year":"2024","journal-title":"Int. J. Math. Model. Simul. Appl."},{"key":"10.1016\/j.csi.2026.104166_bib0039","doi-asserted-by":"crossref","first-page":"71579","DOI":"10.1007\/s11042-023-18097-5","article-title":"Novel nature-inspired optimization approach-based svm for identifying the android malicious data","volume":"83","author":"Panigrahi","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.csi.2026.104166_bib0040","doi-asserted-by":"crossref","unstructured":"Abadi, A., Doyle, B., Gini, F., Guinamard, K., Murakonda, S.K., Liddell, J., Mellor, P., Murdoch, S.J., Naseri, M., Page, H. and Theodorakopoulos, G., \u201cStarlit: privacy-preserving federated learning to enhance financial fraud detection\u201d, arXiv preprint arXiv:2401.10765, 2024.","DOI":"10.1109\/FLTA67013.2025.11336591"},{"issue":"12","key":"10.1016\/j.csi.2026.104166_bib0041","doi-asserted-by":"crossref","first-page":"647","DOI":"10.3390\/info14120647","article-title":"Decentralized federated learning-enabled relation aggregation for anomaly detection","volume":"14","author":"Shuai","year":"2023","journal-title":"Information"},{"key":"10.1016\/j.csi.2026.104166_bib0042","unstructured":"Fraud UPI transaction details database taken from \u201chttps:\/\/www.kaggle.com\/datasets\/iamravi11\/fraud-upi-transaction-details\u201d accessed on February 2025."},{"issue":"2","key":"10.1016\/j.csi.2026.104166_bib0043","doi-asserted-by":"crossref","first-page":"1","DOI":"10.31181\/dmame210402001a","article-title":"Comparative analysis of the normalization techniques in the context of MCDM problems","volume":"4","author":"Aytekin","year":"2021","journal-title":"Decis. Making Appl. Manag. Eng."},{"key":"10.1016\/j.csi.2026.104166_bib0044","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.120069","article-title":"Snow ablation optimizer: a novel metaheuristic technique for numerical optimization and engineering design","volume":"225","author":"Deng","year":"2023","journal-title":"Expert Syst. Appl."},{"issue":"4","key":"10.1016\/j.csi.2026.104166_bib0045","article-title":"Carpet weaver optimization: a novel simple and effective human-inspired metaheuristic algorithm","volume":"17","author":"Alomari","year":"2024","journal-title":"Int. J. Intell. Eng. Syst."},{"key":"10.1016\/j.csi.2026.104166_bib0046","series-title":"proceedings of 2020 8th International Winter Conference on Brain-Computer Interface (BCI)","first-page":"1","article-title":"Data augmentation effects using borderline-SMOTE on classification of a P300-based BCI","author":"Lee","year":"2020"},{"key":"10.1016\/j.csi.2026.104166_bib0047","series-title":"proceedings of Neural Information Processing: 24th International Conference, ICONIP 2017, Guangzhou, China, November 14-18,ssss 2017, Proceedings, Part II 24","first-page":"294","article-title":"Bio-inspired deep spiking neural network for image classification","author":"Li","year":"2017"},{"issue":"4","key":"10.1016\/j.csi.2026.104166_bib0048","doi-asserted-by":"crossref","DOI":"10.3390\/jrfm18040179","article-title":"Secure and transparent banking: explainable AI-driven federated learning model for financial fraud detection","volume":"18","author":"Aljunaid","year":"2025","journal-title":"J. Risk Financ. Manag."},{"key":"10.1016\/j.csi.2026.104166_bib0049","article-title":"Deep learning-based credit card fraud detection in federated learning","volume":"255","author":"Reddy","year":"2024","journal-title":"Expert Syst. Appl."}],"container-title":["Computer Standards &amp; Interfaces"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548926000401?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548926000401?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T17:10:52Z","timestamp":1777309852000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0920548926000401"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,8]]},"references-count":49,"alternative-id":["S0920548926000401"],"URL":"https:\/\/doi.org\/10.1016\/j.csi.2026.104166","relation":{},"ISSN":["0920-5489"],"issn-type":[{"value":"0920-5489","type":"print"}],"subject":[],"published":{"date-parts":[[2026,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"SCWO-SNN: Snow carpet weaver optimization based spiking neural network for fraud detection in UPI transactions using federated learning","name":"articletitle","label":"Article Title"},{"value":"Computer Standards & Interfaces","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.csi.2026.104166","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104166"}}