Submitted:
21 January 2026
Posted:
22 January 2026
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Materials and Methods
2.1. Dataset Description and Study Context
2.2. Experimental Setup and Control Conditions
2.3. Evaluation Metrics and Quality Control
2.4. Data Processing and Model Formulation
2.5. Training Workflow and Timing Constraints
3. Results and Discussion
3.1. Detection Performance Under Reduced Communication
3.2. Latency Behaviour in Real-Time Monitoring
3.3. Robustness Under Client and Network Differences
3.4. Deployment Considerations and Remaining Gaps
4. Conclusion
References
- Arzu, F.; Bajwa, M. K. Z.; Waheed, A.; Alam, F.; Ali, M.; Khan, A. Real-Time Financial Fraud Detection: An Intelligent Data-Driven Framework Integrating Machine Learning, Stream Processing, and Big Data Analytics for High-Velocity Transaction Monitoring. The Asian Bulletin of Big Data Management 2025, 5(4), 124–154. [Google Scholar] [CrossRef]
- Adepoju, A. H.; Austin-Gabriel, B. L. E. S. S. I. N. G.; Eweje, A. D. E. O. L. U. W. A.; Collins, A. N. U. O. L. U. W. A. P. O. Framework for automating multi-team workflows to maximize operational efficiency and minimize redundant data handling. IRE Journals 2022, 5(9), 663–664. [Google Scholar]
- Eboseremen, B. O.; Ogedengbe, A. O.; Obuse, E.; Oladimeji, O.; Ajayi, J. O.; Akindemowo, A. O.; Erigha, E. D. Secure data integration in multi-tenant cloud environments: Architecture for financial services providers. Journal of Frontiers in Multidisciplinary Research 2022, 3(1), 579–592. [Google Scholar] [CrossRef]
- Alazab, M.; Rm, S. P.; Maddikunta, P. K. R.; Gadekallu, T. R.; Pham, Q. V. Federated learning for cybersecurity: Concepts, challenges, and future directions. IEEE Transactions on Industrial Informatics 2021, 18(5), 3501–3509. [Google Scholar] [CrossRef]
- Gu, X.; Liu, M.; Yang, J. Application and Effectiveness Evaluation of Federated Learning Methods in Anti-Money Laundering Collaborative Modeling Across Inter-Institutional Transaction Networks. 2025. [Google Scholar]
- Khan, A. A.; Alsufyani, A.; Alsufyani, N.; Mohamed, M. A. BAML: a decentralized approach to secure, privacy-preserving financial compliance for enhancing anti-money laundering with blockchain hyperledger and federated learning. Peer-to-Peer Networking and Applications 2025, 18(5), 270. [Google Scholar] [CrossRef]
- Yang, Y.; Guo, M.; Corona, E. A.; Daniel, B.; Leuze, C.; Baik, F. VR MRI Training for Adolescents: A Comparative Study of Gamified VR, Passive VR, 360 Video, and Traditional Educational Video. arXiv 2025, arXiv:2504.09955. [Google Scholar] [CrossRef]
- Chowdhury, T. K.; Kudapa, S. P. Federated Learning Models for Privacy-Preserving Data Sharing And Secure Analytics In Healthcare Industry. International Journal of Business and Economics Insights 2024, 4(4), 91–133. [Google Scholar] [CrossRef]
- Zhu, W.; Yao, Y.; Yang, J. Real-Time Risk Control Effects of Digital Compliance Dashboards: An Empirical Study Across Multiple Enterprises Using Process Mining, Anomaly Detection, and Interrupt Time Series. 2025. [Google Scholar] [CrossRef]
- Rot, P.; Grm, K.; Peer, P.; Štruc, V. PrivacyProber: Assessment and detection of soft–biometric privacy–enhancing techniques. IEEE Transactions on Dependable and Secure Computing 2023, 21(4), 2869–2887. [Google Scholar] [CrossRef]
- Li, T.; Jiang, Y.; Hong, E.; Liu, S. Organizational Development in High-Growth Biopharmaceutical Companies: A Data-Driven Approach to Talent Pipeline and Competency Modeling. 2025. [Google Scholar]
- Akkaya, K.; Demirbas, M.; Aygun, R. S. The impact of data aggregation on the performance of wireless sensor networks. Wireless Communications and Mobile Computing 2008, 8(2), 171–193. [Google Scholar] [CrossRef]
- Hu, Z.; Hu, Y.; Li, H. Multi-Task Temporal Fusion Transformer for Joint Sales and Inventory Forecasting in Amazon E-Commerce Supply Chain. arXiv 2025, arXiv:2512.00370. [Google Scholar]
- Tanim, S. A.; Mridha, M. F.; Safran, M.; Alfarhood, S.; Che, D. Secure federated learning for Parkinson’s disease: Non-IID data partitioning and homomorphic encryption strategies. IEEE Access 2024. [Google Scholar] [CrossRef]
- Bai, W. Phishing website detection based on machine learning algorithm. In 2020 International Conference on Computing and Data Science (CDS); ieee, 2020; pp. 293–298. [Google Scholar]
- Hatamizadeh, A.; Yin, H.; Molchanov, P.; Myronenko, A.; Li, W.; Dogra, P.; Roth, H. R. Do gradient inversion attacks make federated learning unsafe? IEEE Transactions on Medical Imaging 2023, 42(7), 2044–2056. [Google Scholar] [CrossRef] [PubMed]
- Sheu, J. B.; Gao, X. Q. Alliance or no alliance—Bargaining power in competing reverse supply chains. European Journal of Operational Research 2014, 233(2), 313–325. [Google Scholar] [CrossRef]
- Zhu, W.; Yao, Y.; Yang, J. Optimizing Financial Risk Control for Multinational Projects: A Joint Framework Based on CVaR-Robust Optimization and Panel Quantile Regression. 2025. [Google Scholar]
- Rahmati, M. Real-Time Financial Fraud Detection Using Adaptive Graph Neural Networks and Federated Learning. Int. J. Management and Data Analytics 2025, 5(1), 98–110. [Google Scholar]
- Wang, J.; Xiao, Y. Research on Credit Risk Forecasting and Stress Testing for Consumer Finance Portfolios Based on Macroeconomic Scenarios. 2025. [Google Scholar] [CrossRef]


Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.