{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T18:18:43Z","timestamp":1769710723763,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,29]]},"DOI":"10.1145\/3778265.3778279","type":"proceedings-article","created":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T07:25:21Z","timestamp":1769671521000},"page":"99-107","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Privacy-Preserving and Interpretable Framework for Financial Fraud Detection Using AI"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-4916-7026","authenticated-orcid":false,"given":"Kutub","family":"Thakur","sequence":"first","affiliation":[{"name":"Department of Cybersecurity, University of Maryland, Adelphi, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4328-0121","authenticated-orcid":false,"given":"Helen","family":"Barker","sequence":"additional","affiliation":[{"name":"Department of Cybersecurity, University of Maryland, Adelphi, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8945-3230","authenticated-orcid":false,"given":"Md L","family":"Ali","sequence":"additional","affiliation":[{"name":"Department of Computer Science &amp; Physics, Rider University, New Jersey, USA"}]}],"member":"320","published-online":{"date-parts":[[2026,1,28]]},"reference":[{"key":"e_1_3_3_1_1_2","volume-title":"Jack Liddell, Paul Mellor, Steven J Murdoch, Mohammad Naseri, Hector Page, et al.","author":"Abadi Aydin","year":"2024","unstructured":"Aydin Abadi, Bradley Doyle, Francesco Gini, Kieron Guinamard, Sasi Kumar Murakonda, Jack Liddell, Paul Mellor, Steven J Murdoch, Mohammad Naseri, Hector Page, et al. 2024. Starlit: Privacy-preserving federated learning to enhance financial fraud detection. arXiv preprint arXiv:2401.10765 (2024)."},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.30574\/wjarr.2025.25.3.0908"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-75201-8_10"},{"key":"e_1_3_3_1_4_2","volume-title":"Mohammad Shahadat Hossain, and Karl Andersson","author":"Ahmed Shamim","year":"2024","unstructured":"Shamim Ahmed, M Shamim Kaiser, Mohammad Shahadat Hossain, and Karl Andersson. 2024. A comparative analysis of lime and shap interpreters with explainable ml-based diabetes predictions. IEEE Access (2024)."},{"key":"e_1_3_3_1_5_2","unstructured":"Kemisola Alader and Ojo Herny. \"Transparency and Privacy: The Role of Explainable AI and Federated Learning in Financial Fraud Prevention.\""},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.3390\/jrfm18040179"},{"key":"e_1_3_3_1_7_2","volume-title":"Financial Fraud Detection Using Explainable AI and Stacking Ensemble Methods. arXiv preprint arXiv:2505.10050","author":"Almalki Fahad","year":"2025","unstructured":"Fahad Almalki and Mehedi Masud. 2025. Financial Fraud Detection Using Explainable AI and Stacking Ensemble Methods. arXiv preprint arXiv:2505.10050 (2025)."},{"key":"e_1_3_3_1_8_2","volume-title":"Raj Mani Shukla, and Bernardi Pranggono","author":"Awosika Tomisin","year":"2024","unstructured":"Tomisin Awosika, Raj Mani Shukla, and Bernardi Pranggono. 2024. Transparency and privacy: the role of explainable ai and federated learning in financial fraud detection. IEEE Access (2024)."},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122861"},{"key":"e_1_3_3_1_10_2","first-page":"1650","article-title":"Federated Learning","volume":"15","author":"Calvino Giulia","year":"2024","unstructured":"Giulia Calvino, Cristina Peconi, Claudia Strafella, Giulia Trastulli, Domenica Megalizzi, Sarah Andreucci, Raffaella Cascella, Carlo Caltagirone, Stefania Zampatti, and Emiliano Giardina. 2024. Federated Learning: Breaking Down Barriers in Global Genomic Research. Genes 15, 12 (2024), 1650.","journal-title":"Breaking Down Barriers in Global Genomic Research. Genes"},{"key":"e_1_3_3_1_11_2","first-page":"62","article-title":"A comprehensive framework for strengthening USA financial cybersecurity: integrating machine learning and AI in fraud detection systems","volume":"11","author":"Ejiofor Oluomachi Eunice","year":"2023","unstructured":"Oluomachi Eunice Ejiofor. 2023. A comprehensive framework for strengthening USA financial cybersecurity: integrating machine learning and AI in fraud detection systems. European Journal of Computer Science and Information Technology 11, 6 (2023), 62\u201383.","journal-title":"European Journal of Computer Science and Information Technology"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.70937\/faet.v1i01.40"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.23919\/FUSION59988.2024.10706324"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2024.102301"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2025.04.033"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-025-11732-2"},{"key":"e_1_3_3_1_17_2","volume-title":"Assessing Emerging Markets through Transactional Dynamics: A New Multi-Dimensional Valuation Framework. Available at SSRN 5013985","author":"Midha Joshua","year":"2024","unstructured":"Joshua Midha. 2024. Assessing Emerging Markets through Transactional Dynamics: A New Multi-Dimensional Valuation Framework. Available at SSRN 5013985 (2024)."},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.51594\/csitrj.v5i3.911"},{"key":"e_1_3_3_1_19_2","first-page":"168","article-title":"Enhancing transparency and understanding in ai decision-making processes","volume":"8","author":"Pillai Vinayak","year":"2024","unstructured":"Vinayak Pillai. 2024. Enhancing transparency and understanding in ai decision-making processes. Iconic Research and Engineering Journals 8, 1 (2024), 168\u2013172.","journal-title":"Iconic Research and Engineering Journals"},{"key":"e_1_3_3_1_20_2","volume-title":"13Leveraging Distribution Systems for Advanced Fraud Detection and Prevention in Finance. Meta Heuristic Algorithms for Advanced Distributed Systems","author":"Podile Venkateswararao","year":"2024","unstructured":"Venkateswararao Podile, Satish M Dhoke, Shouvik K Guha, Frakruddin A Ahmed, TVNJL Haritha, V Abhinav, and M Anirudh. 2024. 13Leveraging Distribution Systems for Advanced Fraud Detection and Prevention in Finance. Meta Heuristic Algorithms for Advanced Distributed Systems (2024), 211\u2013228."},{"key":"e_1_3_3_1_21_2","first-page":"534","article-title":"AI in fraud detection: Leveraging real-time machine learning for financial security","volume":"3","author":"Potla Ravi Teja","year":"2023","unstructured":"Ravi Teja Potla. 2023. AI in fraud detection: Leveraging real-time machine learning for financial security. Journal of Artificial Intelligence Research and Applications 3, 2 (2023), 534\u2013549.","journal-title":"Journal of Artificial Intelligence Research and Applications"},{"key":"e_1_3_3_1_22_2","first-page":"98","article-title":"Real-Time Financial Fraud Detection Using Adaptive Graph Neural Networks and Federated","volume":"5","author":"Rahmati Milad","year":"2025","unstructured":"Milad Rahmati. 2025. Real-Time Financial Fraud Detection Using Adaptive Graph Neural Networks and Federated Learning. Int. J. Management and Data Analytics 5, 1 (2025), 98\u2013110.","journal-title":"Learning. Int. J. Management and Data Analytics"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogsys.2024.101243"},{"key":"e_1_3_3_1_24_2","article-title":"AI-driven fraud detection and security solutions: enhancing accuracy in financial systems","volume":"103","author":"Scientific Little Lion","year":"2025","unstructured":"Little Lion Scientific. 2025. AI-driven fraud detection and security solutions: enhancing accuracy in financial systems. Journal of Theoretical and Applied Information Technology 103, 8 (2025).","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2025.100735"},{"key":"e_1_3_3_1_26_2","volume-title":"Advanced Real-Time Fraud Detection Using RAG-Based LLMs. arXiv preprint arXiv:2501.15290","author":"Singh Gurjot","year":"2025","unstructured":"Gurjot Singh, Prabhjot Singh, and Maninder Singh. 2025. Advanced Real-Time Fraud Detection Using RAG-Based LLMs. arXiv preprint arXiv:2501.15290 (2025)."},{"key":"e_1_3_3_1_27_2","volume-title":"Regulatory Compliance, and Performance Optimization. Introduction to Explainable AI (XAI) in Regulated Industries","author":"Solanke Adedamola","year":"2024","unstructured":"Adedamola Solanke and Warren Liang. 2024. Implementing Explainable AI in Regulated Industries: Balancing Transparency, Regulatory Compliance, and Performance Optimization. Introduction to Explainable AI (XAI) in Regulated Industries (2024)."},{"key":"e_1_3_3_1_28_2","unstructured":"Venkata Tadi and KPMG US. [n. d.]. ESTABLISHING ETHICAL FRAMEWORKS AND BEST PRACTICES FOR FAIR AND TRANSPARENT MACHINE LEARNING-DRIVEN ANOMALY DETECTION SYSTEMS. ([n. d.])."},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.30574\/wjarr.2024.22.2.1575"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyaf002"},{"key":"e_1_3_3_1_31_2","volume-title":"Machine Learning for Intrusion Detection in Computer Networks: A Comparative Study.\" Applied Sciences 15, no. 4 (2025)","author":"Ali Md Liakat","year":"1903","unstructured":"Md Liakat Ali, Kutub Thakur, Suzanna Schmeelk, Joan Debello, and Denise Dragos. \"Deep Learning vs. Machine Learning for Intrusion Detection in Computer Networks: A Comparative Study.\" Applied Sciences 15, no. 4 (2025): 1903."},{"key":"e_1_3_3_1_32_2","first-page":"0477","volume-title":"Electronics & Mobile Communication Conference (UEMCON)","author":"Ali Md Liakat","year":"2024","unstructured":"Md Liakat Ali, Kutub Thakur, Helen Barker, and Michael Chan. \"The rise of artificial intelligence: Industry insights and applications in security information and event management (SIEM).\" In 2024 IEEE 15th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), pp. 0477-0482. IEEE, 2024."},{"key":"e_1_3_3_1_33_2","first-page":"1","volume-title":"Internet of Things and Microwave Systems (ICCIMS)","author":"Ali Md L.","year":"2024","unstructured":"Md L. Ali, Kutub Thakur, and Muath A. Obaidat. \"The Application of Layered Authentication in Cybersecurity.\" In 2024 International Conference on Computing, Internet of Things and Microwave Systems (ICCIMS), pp. 1-5. IEEE, 2024."},{"key":"e_1_3_3_1_34_2","volume-title":"IEEE","author":"Thakur Kutub","year":"2024","unstructured":"Kutub Thakur, Helen Barker, and Md Liakat Ali. \"Human Error in Cybersecurity Management.\" In 2024 IEEE Technology and Engineering Management Society (TEMSCON LATAM), pp. 1-6. IEEE, 2024."},{"key":"e_1_3_3_1_35_2","unstructured":"IEEE-CIS Fraud Detection Retrieved July 27 2025 from https:\/\/www.kaggle.com\/competitions\/ieee-fraud-detection"}],"event":{"name":"BDSIC 2025: 2025 7th International Conference on Big-data Service and Intelligent Computation","location":"Bangkok Thailand","acronym":"BDSIC 2025"},"container-title":["Proceedings of the 2025 7th International Conference on Big-data Service and Intelligent Computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3778265.3778279","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T07:25:48Z","timestamp":1769671548000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3778265.3778279"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,29]]},"references-count":35,"alternative-id":["10.1145\/3778265.3778279","10.1145\/3778265"],"URL":"https:\/\/doi.org\/10.1145\/3778265.3778279","relation":{},"subject":[],"published":{"date-parts":[[2025,10,29]]},"assertion":[{"value":"2026-01-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}