Blockchain-Based Fraud Detection: A Comparative Systematic Literature Review of Federated Learning and Machine Learning Approaches
Abstract
1. Introduction
2. Materials and Methods
3. Results
4. Discussion
Proposed Theoretical Framework for Blockchain-Based Federated Learning Fraud Detection
5. Conclusions
- Centralized ML for high-speed, single-organization fraud detection.
- FL-blockchain for privacy-preserving, cross-institutional collaboration.
- Hybrid systems for balancing real-time performance with security.
Author Contributions
Funding
Conflicts of Interest
References
- Jeragh, M.; Alsulaimi, M. Combining Auto Encoders and One Class Support Vectors Machine for Fraudulant Credit Card Transactions Detection. In Proceedings of the 2018 Second World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), London, UK, 30–31 October 2018; pp. 178–184. [Google Scholar]
- West, J.; Bhattacharya, M. Some experimental issues in financial fraud mining. Procedia Comput. Sci. 2016, 80, 1734–1744. [Google Scholar] [CrossRef]
- Bhattacharyya, S.; Jha, S.; Tharakunnel, K.; Westland, J.C. Data mining for credit card fraud: A comparative study. Decis. Support Syst. 2011, 50, 602–613. [Google Scholar] [CrossRef]
- Mareeswari, V.; Gunasekaran, G. Prevention of credit card fraud detection based on HSVM. In Proceedings of the 2016 International Conference on Information Communication and Embedded Systems (ICICES), Chennai, India, 25–26 February 2016; pp. 1–4. [Google Scholar]
- Srivastava, A.; Yadav, M.; Basu, S.; Salunkhe, S.; Shabad, M. Credit card fraud detection at merchant side using neural networks. In Proceedings of the 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 16–18 March 2016; pp. 667–670. [Google Scholar]
- Dal Pozzolo, A.; Boracchi, G.; Caelen, O.; Alippi, C.; Bontempi, G. Credit card fraud detection: A realistic modeling and a novel learning strategy. IEEE Trans. Neural Netw. Learn. Syst. 2017, 29, 3784–3797. [Google Scholar] [CrossRef] [PubMed]
- Kirlidog, M.; Asuk, C. A Fraud Detection Approach with Data Mining in Health Insurance. Procedia-Soc. Behav. Sci. 2012, 62, 989–994. [Google Scholar] [CrossRef]
- Hancock, J.T.; Khoshgoftaar, T.M. Survey on categorical data for neural networks. J. Big Data 2020, 7, 28. [Google Scholar] [CrossRef]
- Kho, J.R.D.; Vea, L.A. Credit card fraud detection based on transaction behavior. In Proceedings of the TENCON 2017-2017 IEEE Region 10 Conference, Penang, Malaysia, 5–8 November 2017; pp. 1880–1884. [Google Scholar]
- HaratiNik, M.R.; Akrami, M.; Khadivi, S.; Shajari, M. FUZZGY: A hybrid model for credit card fraud detection. In Proceedings of the 6th International Symposium on Telecommunications (IST), Tehran, Iran, 6–8 November 2012; pp. 1088–1093. [Google Scholar]
- Jimenez-Gutierrez, D.M.; Falkouskaya, Y.; Hernandez-Ramos, J.L.; Anagnostopoulos, A.; Chatzigiannakis, I.; Vitaletti, A. On the Security and Privacy of Federated Learning: A Survey with Attacks, Defenses, Frameworks, Applications, and Future Directions. arXiv 2025, arXiv:2508.13730. [Google Scholar] [CrossRef]
- Qammar, A.; Karim, A.; Ning, H.; Ding, J. Securing Federated Learning with Blockchain: A Systematic Literature Review. Artif. Intell. Rev. 2023, 56, 3951–3985. [Google Scholar] [CrossRef]
- Lin, Q.; Xu, K.; Huang, Y.; Yu, F.; Wang, X. Privacy-Enhanced Data Fusion for Federated Learning Empowered Internet of Things. Mob. Inf. Syst. 2022, 2022, 3850246. [Google Scholar] [CrossRef]
- Liu, P.; Xu, X.; Wang, W. Threats attacks and defenses to federated learning: Issues taxonomy and perspectives. Cybersecurity 2022, 5, 4. [Google Scholar] [CrossRef]
- Yang, W.; Wang, S.; Wu, D.; Cai, T.; Zhu, Y.; Wei, S.; Zhang, Y.; Yang, X.; Tang, Z.; Li, Y. Deep learning model inversion attacks and defenses: A comprehensive survey. Artif. Intell. Rev. 2025, 58, 242. [Google Scholar] [CrossRef]
- Melis, L.; Song, C.; De Cristofaro, E.; Shmatikov, V. Inference attacks against collaborative learning. arXiv 2018, arXiv:1805.04049. [Google Scholar]
- Malik, H.A.M.; Shah, A.A.; Muhammad, A.; Kananah, A.; Aslam, A. Resolving Security Issues in the IoT Using Blockchain. Electronics 2022, 11, 3950. [Google Scholar] [CrossRef]
- Elhoseny, M.; Haseeb, K.; Shah, A.A.; Ahmad, I.; Jan, Z.; Alghamdi, M.I. IoT Solution for AI-Enabled PRIVACY-PREServing with Big Data Transferring: An Application for Healthcare Using Blockchain. Energies 2021, 14, 5364. [Google Scholar] [CrossRef]
- Qu, Y.; Gao, L.; Luan, T.H.; Xiang, Y.; Yu, S.; Li, B.; Zheng, G. Decentralized Privacy Using Blockchain-Enabled Federated Learning in Fog Computing. IEEE Internet Things J. 2020, 7, 5171–5183. [Google Scholar] [CrossRef]
- Saba, T.; Haseeb, K.; Shah, A.A.; Rehman, A.; Tariq, U.; Mehmood, Z. A Machine-Learning-Based Approach for Autonomous IoT Security. IT Prof. 2021, 23, 69–75. [Google Scholar] [CrossRef]
- Mishra, A.; Ghorpade, C. Credit Card Fraud Detection on the Skewed Data Using Various Classification and Ensemble Techniques. In Proceedings of the 2018 IEEE International Students’ Conference on Electrical, Electronics and Computer Science (SCEECS), Bhopal, India, 24–25 February 2018; pp. 1–5. [Google Scholar]
- McMahan, B.; Moore, E.; Ramage, D.; Hampson, S.; Arcas, B. Communication-efficient learning of deep networks from decentralized data. In Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (PMLR), Fort Lauderdale, FL, USA, 20–22 April 2017; pp. 1273–1282. [Google Scholar]
- Ravisankar, P.; Ravi, V.; Rao, G.R.; Bose, I. Detection of financial statement fraud and feature selection using data mining techniques. Decis. Support Syst. 2011, 50, 491–500. [Google Scholar] [CrossRef]
- Baabdullah, T.; Alzahrani, A.; Rawat, D.B.; Liu, C. Efficiency of federated learning and blockchain in preserving privacy and enhancing the performance of credit card fraud detection (CCFD) systems. Future Internet 2024, 16, 196. [Google Scholar] [CrossRef]
- Guo, H.; Meese, C.; Li, W.; Shen, C.-C.; Nejad, M. B²SFL: A Bi-Level Blockchained Architecture for Secure Federated Learning-Based Traffic Prediction. IEEE Trans. Serv. Comput. 2023, 16, 4360–4374. [Google Scholar] [CrossRef]
- McMahan, H.B.; Ramage, D.; Talwar, K.; Zhang, L. Learning differentially private recurrent language models. arXiv 2017, arXiv:1710.06963. [Google Scholar]
- Voigt, P.; Von dem Bussche, A. The eu general data protection regulation (gdpr). In A Practical Guide, 1st ed.; Springer International Publishing: Cham, Switzerland, 2017; Volume 10, p. 10-5555. [Google Scholar]
- Kang, J.; Xiong, Z.; Li, X.; Zhang, Y.; Niyato, D.; Leung, C.; Miao, C. Optimizing task assignment for reliable blockchain-empowered federated edge learning. IEEE Trans. Veh. Technol. 2021, 70, 1910–1923. [Google Scholar] [CrossRef]
- Xu, R.; Li, C.; Josh, J. Blockchain-based transparency framework for privacy-preserving third-party services. IEEE Trans. Depend. Secur. Comput. 2023, 20, 2302–2313. [Google Scholar] [CrossRef]
- Abbasi, A.; Albrecht, C.; Vance, A.; Hansen, J. Metafraud: A meta-learning framework for detecting financial fraud. Mis Q. 2012, 36, 1293–1327. [Google Scholar] [CrossRef]
- Yao, J.; Zhang, J.; Wang, L. A financial statement fraud detection model based on hybrid data mining methods. In Proceedings of the 2018 International Conference on Artificial Intelligence and Big Data (ICAIBD), Chengdu, China, 26–28 May 2018; pp. 57–61. [Google Scholar]
- Khan, A.; Singh, T.; Sinhal, A.; Khan, A.; Singh, T. Implement credit card fraudulent detection system using observation probabilistic in hidden Markov model. In Proceedings of the 2012 Nirma University International Conference on Engineering (NUiCONE), Ahmedabad, India, 6–8 December 2012; pp. 1–6. [Google Scholar]
- Emmott, A.F.; Das, S.; Dietterich, T.; Fern, A.; Wong, W.K. Systematic construction of anomaly detection benchmarks from real data. In Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description, Chicago, IL, USA, 11 August 2013; pp. 16–21. [Google Scholar]
- Yang, W.; Zhang, Y.; Ye, K.; Li, L.; Xu, C.Z. Ffd: A federated learning based method for credit card fraud detection. In International Conference on Big Data; Springer International Publishing: Cham, Switzerland, 2019; pp. 18–32. [Google Scholar]
- Aurna, N.F.; Hossain, M.D.; Taenaka, Y.; Kadobayashi, Y. Federated Learning-Based Credit Card Fraud Detection: Performance Analysis with Sampling Methods and Deep Learning Algorithms. In Proceedings of the 2023 IEEE International Conference on Cyber Security and Resilience (CSR), Montreal, Canada, 27–29 June 2023; pp. 180–186. [Google Scholar]
- Wang, Z.; Hu, Q.; Xu, M.; Zhuang, Y.; Wang, Y.; Cheng, X. A systematic survey of blockchained federated learning. arXiv 2021, arXiv:2110.02182. [Google Scholar]
- Qu, Y.; Uddin, M.P.; Gan, C.; Xiang, Y.; Gao, L.; Yearwood, J. Blockchain-enabled federated learning: A survey. ACM Comput. Surv. 2022, 55, 1–35. [Google Scholar] [CrossRef]
- Simonyan, K.; Zisserman, A. Very deep convolutional networks for large-scale image recognition. arXiv 2014, arXiv:1409.1556. [Google Scholar]
- Zhang, H.; Jiang, S.; Xuan, S. Decentralized Federated Learning Based on Blockchain: Concepts, Framework, and Challenges. Comput. Commun. 2024, 216, 140–150. [Google Scholar] [CrossRef]
- Liu, B.; Lv, N.; Guo, Y.; Li, Y. Recent Advances on Federated Learning: A Systematic Survey. Neurocomputing 2024, 597, 128019. [Google Scholar] [CrossRef]
- Geng, J. Co-Construction Scheme of Credit Risk Control Model for Small and Medium-Sized Banks Based on Federated Transfer Learning. In Proceedings of the 2025 2nd International Conference on Digital Economy, Blockchain and Artificial Intelligence, Dalian, China, 1–21 November 2025; pp. 370–376. [Google Scholar]
- Lynch, S.; Abdelmoniem, A.M.; Gill, S.S. Centralised and Decentralised Fraud Detection Approaches in Federated Learning. In Applications of AI for Interdisciplinary Research; Taylor & Francis Group: Boca Raton, NW, USA, 2024; p. 205. [Google Scholar]
- Zhang, J.; Guo, S.; Qu, Z.; Zeng, D.; Wang, H.; Liu, Q.; Zomaya, A.Y. Adaptive Vertical Federated Learning on Unbalanced Features. IEEE Trans. Parallel Distrib. Syst. 2022, 33, 4006–4018. [Google Scholar] [CrossRef]
- Alhasawi, Y.; Almtrf, A.A.; Asad, M. A Federated Approach to Scalable and Trustworthy Financial Fraud Detection. Secur. Priv. 2025, 8, e70099. [Google Scholar] [CrossRef]
- Carlini, N.; Wagner, D. Towards evaluating the robustness of neural networks. In Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 22–24 May 2017; pp. 39–57. [Google Scholar]
- Moosavi-Dezfooli, S.M.; Fawzi, A.; Frossard, P. Deepfool: A simple and accurate method to fool deep neural networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA, 27–30 June 2016; pp. 2574–2582. [Google Scholar]
- Zhang, J.; Li, C. Adversarial examples: Opportunities and challenges. IEEE Trans. Neural Netw. Learn. Syst. 2019, 31, 2578–2593. [Google Scholar] [CrossRef]
- Liu, Y.; Chen, X.; Liu, C.; Song, D. Delving into transferable adversarial examples and black-box attacks. arXiv 2017, arXiv:1611.02770. [Google Scholar] [CrossRef]
- Su, J.; Vargas, D.V.; Sakurai, K. One Pixel Attack for Fooling Deep Neural Networks. IEEE Trans. Evol. Comput. 2019, 23, 828–841. [Google Scholar] [CrossRef]
- Yuan, X.; He, P.; Zhu, Q.; Li, X. Adversarial examples: Attacks and defenses for deep learning. IEEE Trans. Neural Netw. Learn. Syst. 2019, 30, 2805–2824. [Google Scholar] [CrossRef]
- Tramèr, F.; Kurakin, A.; Papernot, N.; Goodfellow, I.; Boneh, D.; McDaniel, P. Ensemble adversarial training: Attacks and defenses. arXiv 2017, arXiv:1705.07204. [Google Scholar]
- Guembe, B.; Azeta, A.; Osamor, V.; Ekpo, R. Federated learning for decentralized anti-money laundering. In Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Toronto, ON, Canada, 4–7 May 2020; pp. 1–13. [Google Scholar]
- Moamen, A.A.; Jamali, N. An actor-based middleware for crowd-sourced services. ICST Trans. Mob. Commun. Appl. 2017, 3, e1. [Google Scholar]
- Aslam, A.; Postolache, O.; Oliveira, S.; Pereira, J.D. Securing IoT Sensors Using Sharding-Based Blockchain Network Technology Integration: A Systematic Review. Sensors 2025, 25, 807. [Google Scholar] [CrossRef]
- Ostapowicz, M.; Zbikowski, K. Detecting fraudulent accounts on blockchain: A supervised approach. In Web Information Systems Engineering–WISE 2019: Proceedings of the 20th International Conference, Hong Kong, China, 19–22 January 2020; Proceedings 20; Springer International Publishing: Berlin/Heidelberg, Germany, 2019; pp. 18–31. [Google Scholar]
- Chatterjee, P.; Das, D.; Rawat, D. Securing Financial Transactions: Exploring the Role of Federated Learning and Blockchain in Credit Card Fraud Detection. Authorea Prepr. 2023. [Google Scholar]
- Yang, Q.; Liu, Y.; Chen, T.; Tong, Y. Federated machine learning: Concept and applications. ACM Trans. Intell. Syst. Technol. (TIST) 2019, 10, 12. [Google Scholar] [CrossRef]
- Ogundokun, R.O.; Misra, S.; Maskeliunas, R.; Damasevicius, R. A review on federated learning and machine learning approaches: Categorization, application areas, and blockchain technology. Information 2022, 13, 263. [Google Scholar] [CrossRef]
- Rajak, I.; Mathai, K.J. Intelligent fraudulent detection system based SVM and optimized by danger theory. In Proceedings of the 2015 International Conference on Computer, Communication and Control (IC4), Indore, India, 10–12 September 2015; pp. 1–4. [Google Scholar]
- Stefánsson, H.P.; Grímsson, H.S.; Þórðarson, J.K.; Óskarsdóttir, M. Detecting Potential Money Laundering Addresses in the Bitcoin Blockchain Using Unsupervised Machine Learning. In Proceedings of the HICSS, Online, 4–7 January 2022; pp. 1–10. [Google Scholar]
- Randhawa, K.; Loo, C.K.; Seera, M.; Lim, C.P.; Nandi, A.K. Credit Card Fraud Detection Using AdaBoost and Majority Voting. IEEE Access 2018, 6, 14277–14284. [Google Scholar] [CrossRef]
- Subudhi, S.; Panigrahi, S. Effect of Class Imbalanceness in Detecting Automobile Insurance Fraud. In Proceedings of the 2018 2nd International Conference on Data Science and Business Analytics (ICDSBA), Changsha, China, 21–23 September 2018; pp. 528–531. [Google Scholar]
- Ouadrhiri, A.E.; Abdelhadi, A. Differential Privacy for Deep and Federated Learning: A Survey. IEEE Access 2022, 10, 22359–22380. [Google Scholar] [CrossRef]
- Wang, Y.; Yang, J. Credit card fraud detection based on unsupervised attentional anomaly detection network. In Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics (ISI), Shenzhen, China, 1–3 July 2019; pp. 146–148. [Google Scholar]
- LeCun, Y.; Bottou, L.; Bengio, Y.; Haffner, P. Gradient-based learning applied to document recognition. Proc. IEEE 2002, 86, 2278–2324. [Google Scholar] [CrossRef]
- Madni, H.A.; Umer, R.M.; Foresti, G.L. Blockchain-based swarm learning for the mitigation of gradient leakage in federated learning. IEEE Access 2023, 11, 16549–16556. [Google Scholar] [CrossRef]
- Le, N.K.; Liu, Y.; Nguyen, Q.M.; Liu, Q.; Liu, F.; Cai, Q.; Hirche, S. Fedxgboost: Privacy-preserving xgboost for federated learning. arXiv Prepr. 2021, arXiv:2106.10662. [Google Scholar]
- Ahmed, A.A.; Alabi, O.O. Secure and scalable blockchain-based federated learning for cryptocurrency fraud detection: A systematic review. IEEE Access 2024, 12, 102219–102241. [Google Scholar] [CrossRef]
- Li, Q.; Wen, Z.; He, B. Practical federated gradient boosting decision trees. In Proceedings of the AAAI Conference on Artificial Intelligence, New York, NY, USA, 7–12 February 2020; Volume 34, pp. 4642–4649. [Google Scholar]
- Cheng, D.; Zou, Y.; Xiang, S.; Jiang, C. Graph Neural Networks for Real-Time Fraud Detection in Payment Networks. IEEE Access 2022, 10, 123456–123470. [Google Scholar]
- Effendi, F.; Chattopadhyay, A. Privacy-Preserving Graph-Based Machine Learning with Fully Homomorphic Encryption for Collaborative Anti-Money Laundering. In Proceedings of the International Conference on Security, Privacy, and Applied Cryptography Engineering, Kottayam, India, 14–17 December 2024; pp. 80–105. [Google Scholar]
- Shahsavari, Y.; Dambri, O.A.; Baseri, Y.; Hafid, A.S.; Makrakis, D. Integration of Federated Learning and Blockchain in Healthcare: A Tutorial. arXiv 2025, arXiv:2404.10092. [Google Scholar]
- Kairouz, P.; McMahan, H.B.; Avent, B.; Bellet, A.; Bennis, M.; Bhagoji, A.N.; Bonawitz, K.; Charles, Z.; Cormode, G.; Cummings, R.; et al. Advances and Open Problems in Federated Learning. Found. Trends Mach. Learn. 2021, 14, 1–210. [Google Scholar] [CrossRef]
- Truex, S.; Baracaldo, N.; Anwar, A.; Steinke, T.; Ludwig, H.; Zhang, R.; Zhou, Y. A hybrid approach to privacy-preserving federated learning. In Proceedings of the 12th ACM workshop on artificial intelligence and security, London, UK, 15 November 2019; pp. 1–11. [Google Scholar]
- Lian, Z.; Zeng, Q.; Wang, W.; Gadekallu, T.R.; Su, C. Blockchain-Based Two-Stage Federated Learning with Non-IID Data in IoMT System. IEEE Trans. Comput. Soc. Syst. 2023, 10, 1701–1710. [Google Scholar] [CrossRef]
- Nguyen, D.C.; Ding, M.; Pathirana, P.N.; Seneviratne, A.; Li, J.; Poor, H.V. Federated learning for internet of things: A comprehensive survey. IEEE Commun. Surv. Tutor. 2021, 23, 1622–1658. [Google Scholar] [CrossRef]
- Wei, K.; Li, J.; Ding, M.; Ma, C.; Yang, H.H.; Farokhi, F.; Jin, S.; Quek, T.Q.S.; Poor, H.V. Federated Learning with Differential Privacy: Algorithms and Performance Analysis. IEEE Trans. Inf. Forensics Secur. 2020, 15, 3454–3469. [Google Scholar] [CrossRef]
- Hitaj, B.; Ateniese, G.; Perez-Cruz, F. Deep models under the GAN: Information leakage from collaborative deep learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA, 30 October 2017–3 November 2017; pp. 603–618. [Google Scholar]
- Skovajsova, L.; Hluchý, L.; Staňo, M. A Review of Multi-Objective and Multi-Task Federated Learning Approaches. In Proceedings of the 2025 IEEE 23rd World Symposium on Applied Machine Intelligence and Informatics (SAMI), Stará Lesná, Slovakia, 23–25 January 2025; pp. 35–40. [Google Scholar]
- Ahmed, A.A.; Okoroafor, N. An ML-powered risk assessment system for predicting prospective mass shooting. Computers 2023, 12, 42. [Google Scholar] [CrossRef]
- Wu, X.; Zhang, H.; Chen, H.; Wang, S.; Gong, L. Combustion optimization study of pulverized coal boiler based on proximal policy optimization algorithm. Appl. Therm. Eng. 2024, 254, 123857. [Google Scholar] [CrossRef]
- Foerster, J.; Assael, I.A.; De Freitas, N.; Whiteson, S. Learning to Communicate with Deep Multi-Agent Reinforcement Learning. Adv. Neural Inf. Process. Syst. 2016, arXiv:1605.06676. [Google Scholar]
- Zong, B.; Song, Q.; Min, M.R.; Cheng, W.; Lumezanu, C.; Cho, D.; Chen, H. Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In Proceedings of the International Conference on Learning Representations, Vancouver, BC, Canada, 16 February 2018. [Google Scholar]
- Liu, F.T.; Ting, K.M.; Zhou, Z.H. Isolation forest. In Proceedings of the 2008 Eighth IEEE International Conference on Data Mining, Pisa, Italy, 15–19 December 2008; pp. 413–422. [Google Scholar]
- Bauder, R.; da Rosa, R.; Khoshgoftaar, T. Identifying Medicare Provider Fraud with Unsupervised Machine Learning. In Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration (IRI), Salt Lake City, UT, USA, 7–9 July 2018; pp. 285–292. [Google Scholar]
- Alghushairy, O.; Alsini, R.; Soule, T.; Ma, X. A review of local outlier factor algorithms for outlier detection in big data streams. Big Data Cogn. Comput. 2020, 5, 1. [Google Scholar] [CrossRef]
- Anbarasi, M.S.; Dhivya, S. Fraud detection using outlier predictor in health insurance data. In Proceedings of the 2017 International Conference on Information Communication and Embedded Systems (ICICES), Chennai, India, 23–24 February 2017; pp. 1–6. [Google Scholar]
- Abdul Salam, M.; Fouad, K.M.; Elbably, D.L.; Elsayed, S.M. Federated Learning Model for Credit Card Fraud Detection with Data Balancing Techniques. Neural Comput. Appl. 2024, 36, 6231–6256. [Google Scholar] [CrossRef]
- Raza, A.; Tran, K.P.; Koehl, L.; Li, S. AnoFed: Adaptive anomaly detection for digital health using transformer-based federated learning and support vector data description. Eng. Appl. Artif. Intell. 2023, 121, 106051. [Google Scholar] [CrossRef]
- Devlin, J.; Chang, M.W.; Lee, K.; Toutanova, K. Bert: Pre-training of deep bidirectional transformers for language understanding. In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Minneapolis, MN, USA, 2–7 June 2019; Volume 1, pp. 4171–4186. [Google Scholar]
- Razumovskaia, E.; Vulić, I.; Korhonen, A. Analyzing and adapting large language models for few-shot multilingual nlu: Are we there yet? Trans. Assoc. Comput. Linguist. 2025, 13, 1096–1120. [Google Scholar]
- Lillicrap, T.P.; Hunt, J.J.; Pritzel, A.; Heess, N.; Erez, T.; Tassa, Y.; Silver, D.; Wierstra, D. Continuous control with deep reinforcement learning. arXiv 2015, arXiv:1509.02971. [Google Scholar]
- Baracaldo, N.; Shaul, H.; Martineau, K.; Murphy, M.; Drucker, N.; Kadhe, S.; Ludwig, H. Federated Learning Meets Homomorphic Encryption. IBM Res. Blog 2023. Available online: https://research.ibm.com/blog/federated-learning-homomorphic-encryption?trk=public_post_main-feed-card_feed-article-content (accessed on 25 May 2025).
- Madi, A.; Stan, O.; Mayoue, A.; Grivet-Sébert, A.; Gouy-Pailler, C.; Sirdey, R. A Secure Federated Learning Framework Using Homomorphic Encryption and Verifiable Computing. In Proceedings of the 2021 Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge (RDAAPS), Montreal, Canada, 14–16 July 2021; pp. 1–8. [Google Scholar] [CrossRef]
- Ullah, I.; Deng, X.; Pei, X.; Jiang, P.; Mushtaq, H. A Verifiable and Privacy-Preserving Blockchain-Based Federated Learning Approach. Peer-to-Peer Netw. Appl. 2023, 16, 2256–2270. [Google Scholar] [CrossRef]
- Xing, Z.; Zhang, Z.; Zhang, Z.; Li, Z.; Li, M.; Liu, J.; Zhang, Z.; Zhao, Y.; Sun, Q.; Zhu, L.; et al. Zero-Knowledge Proof-Based Verifiable Decentralized Machine Learning in Communication Network: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2025, early access. [Google Scholar] [CrossRef]
- Hard, A.; Rao, K.; Mathews, R.; Ramaswamy, S.; Beaufays, F.; Augenstein, S.; Eichner, H.; Kiddon, C.; Ramage, D. Federated learning for mobile keyboard prediction. arXiv 2018, arXiv:1811.03604. [Google Scholar]
- Soydaner, D. Attention mechanism in neural networks: Where it comes and where it goes. Neural Comput. Appl. 2022, 34, 13371–13385. [Google Scholar] [CrossRef]
- Uddin, M.P.; Xiang, Y.; Hasan, M.; Bai, J.; Zhao, Y.; Gao, L. A Systematic Literature Review of Robust Federated Learning: Issues, Solutions, and Future Research Directions. ACM Comput. Surv. 2025, 57, 1–62. [Google Scholar] [CrossRef]
- Al-Rubaie, M.; Chang, J.M. Privacy-preserving machine learning: Threats and solutions. IEEE Secur. Priv. 2019, 17, 49–58. [Google Scholar] [CrossRef]
- Peng, H.; You, M. The Health Care Fraud Detection Using the Pharmacopoeia Spectrum Tree and Neural Network Analytic Contribution Hierarchy Process. In Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, 23–26 August 2016; pp. 2006–2011. [Google Scholar]
- Fu, X.; Zhang, B.; Dong, Y.; Chen, C.; Li, J. Federated graph machine learning: A survey of concepts, techniques, and applications. ACM SIGKDD Explor. Newsl. 2022, 24, 32–47. [Google Scholar] [CrossRef]
- Hasan, M.M. Federated Learning Models for Privacy-Preserving AI In Enterprise Decision Systems. Int. J. Bus. Econ. Insights 2025, 5, 238–269. [Google Scholar] [CrossRef]
- Li, X.; Zhao, H.; Chen, X.; Deng, W. Homomorphic Encryption and Secure Aggregation Based Vertical-Horizontal Federated Learning for Flight Operation Data Sharing. In Proceedings of the 2024 5th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT), Nanjing, China, 29–31 March 2024. [Google Scholar]
- Alowolodu, O.D. Ensemble Learning Approach to Fraud Detection in Cryptocurrency Blockchain. Int. J. Comput. Appl. 2025, 186, 35–41. [Google Scholar] [CrossRef]
- Shaik, N.; Bhavana, N.; Sindhu, T.H.; Harshitha, P.; Johny, U. Enhancing Financial Fraud Detection with Explainable AI and Federated Learning. In Proceedings of the 2025 International Conference on Technology Enabled Economic Changes (InTech), Shanghai, China, 23–25 May 2025; pp. 1181–1191. [Google Scholar]
- El Bouchti, A.; Chakroun, A.; Abbar, H.; Okar, C. Fraud detection in banking using deep reinforcement learning. In Proceedings of the 2017 Seventh International Conference on Innovative Computing Technology (INTECH), Luton, UK, 16–18 August 2017; pp. 58–63. [Google Scholar]
- Baptista, G.; Ohara, M.; Calomiris, C.W. Federated Learning for Real Time Fraud Detection in Decentralized Exchanges. Multidiscip. Stud. Innov. Res. 2021, 2, 1–12. [Google Scholar]
- Shah, A.F.M.S.S.; Karabulut, M.A.; Akhter, A.F.M.S.; Mustari, N.; Pathan, A.-S.K.; Rabie, K.M.; Shongwe, T. On the Vital Aspects and Characteristics of Cryptocurrency—A Survey. IEEE Access 2023, 11, 9451–9468. [Google Scholar] [CrossRef]
- Ali, S.; Irfan, M.M.; Bomai, A.; Zhao, C. Towards privacy-preserving deep learning: Opportunities and challenges. In Proceedings of the 2020 IEEE 7th International Conference on Data Science and Advanced Analytics (DSAA), Sydney, NSW, Australia, 6–9 October 2020; pp. 673–682. [Google Scholar]
- Cholakoska, A.; Pfitzner, B.; Gjoreski, H.; Rakovic, V.; Arnrich, B.; Kalendar, M. Differentially Private Federated Learning for Anomaly Detection in eHealth Networks. In Adjunct Proceedings of the 2021 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2021 ACM International Symposium on Wearable Computers; Association for Computing Machinery: New York, NY, USA, 2021; pp. 514–518. [Google Scholar]
- Ojo, I.P.; Tomy, A. Explainable AI for credit card fraud detection: Bridging the gap between accuracy and interpretability. World J. Adv. Res. Rev. 2025, 25, 1246–1256. [Google Scholar] [CrossRef]
- Bartoletti, M.; Pes, B.; Serusi, S. Data Mining for Detecting Bitcoin Ponzi Schemes. In Proceedings of the 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), Zug, Switzerland, 20–22 June 2018; pp. 75–84. [Google Scholar]
- Chalapathy, R.; Chawla, S. Deep Learning for Anomaly Detection: A Survey. arXiv 2019, arXiv:1901.03407. [Google Scholar] [CrossRef]
- Bagdasaryan, E.; Poursaeed, O.; Shmatikov, V. Differential Privacy Has Disparate Impact on Model Accuracy. Adv. Neural Inf. Process. Syst. 2019, 32, 1–10. [Google Scholar]
- Dwork, C.; Roth, A. The algorithmic foundations of differential privacy. Found. Trends® Theor. Comput. Sci. 2014, 9, 211–407. [Google Scholar] [CrossRef]
- Selvaraj, A.; Selvaraj, A.; Venkatachalam, D. Generative Adversarial Networks (GANs) for Synthetic Financial Data Generation: Enhancing Risk Modeling and Fraud Detection in Banking and Insurance. J. Artif. Intell. Res. 2022, 2, 230–269. [Google Scholar]
- Badriyah, T.; Rahmaniah, L.; Syarif, I. Nearest Neighbour and Statistics Method based for Detecting Fraud in Auto Insurance. In Proceedings of the 2018 International Conference on Applied Engineering (ICAE), Batam, Indonesia, 3–4 October 2018; pp. 1–5. [Google Scholar]
- Liang, X.; Liu, Y.; Luo, J.; He, Y.; Chen, T.; Yang, Q. Self-Supervised Cross-Silo Federated Neural Architecture Search. arXiv 2021, arXiv:2101.11896. [Google Scholar]
- Ye, M.; Fang, X.; Du, B.; Yuen, P.C.; Tao, D. Heterogeneous federated learning: State-of-the-art and research challenges. ACM Comput. Surv. 2023, 56, 1–44. [Google Scholar] [CrossRef]
- Hajek, P.; Henriques, R. Mining corporate annual reports for intelligent detection of financial statement fraud—A comparative study of machine learning methods. Knowl.-Based Syst. 2017, 128, 139–152. [Google Scholar] [CrossRef]
- Aziz, R.M.; Mahto, R.; Goel, K.; Das, A.; Kumar, P.; Saxena, A. Modified Genetic Algorithm with Deep Learning for Fraud Transactions of Ethereum Smart Contract. Appl. Sci. 2023, 13, 697. [Google Scholar] [CrossRef]
- Hu, Q.; Wang, Z.; Xu, M.; Cheng, X. Blockchain and federated edge learning for privacy-preserving mobile crowdsensing. IEEE Internet Things J. 2023, 10(14), 12000–12011. [Google Scholar] [CrossRef]
- Mashatan, A.; Sangari, M.S.; Dehghani, M. How perceptions of information privacy and security impact consumer trust in crypto-payment: An empirical study. IEEE Access 2022, 10, 69441–69454. [Google Scholar] [CrossRef]
- Billah, M.; Mehedi, S.T.; Anwar, A.; Rahman, Z.; Islam, R. A systematic literature review on blockchain enabled federated learning framework for Internet of Vehicles. arXiv 2022, arXiv:2203.05192. [Google Scholar] [CrossRef]
- Brecko, A.; Kajati, E.; Koziorek, J.; Zolotova, I. Federated learning for edge computing: A survey. Appl. Sci. 2022, 12, 9124. [Google Scholar] [CrossRef]
- Durgapal, P.; Kataria, P.; Garg, G.; Anand, A.S. A comprehensive distributed framework for cross-silo federated learning using blockchain. In Proceedings of the 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA), Kuwait, Kuwait, 24–26 October 2023; pp. 538–545. [Google Scholar]
- Ahmed, A.A. A model and middleware for composable IoT services. In Proceedings of the International Conference on Internet Computing (ICOMP), Athens, Greece, 3–6 June 2019; pp. 108–114. [Google Scholar]
- Rao, S.X.; Jiang, J.; Han, Z.; Yin, H. Fraud Detection in E-Commerce: A Systematic Review of Transaction Risk Prevention. In Anomaly Detection-Methods, Complexities and Applications; IntechOpen: London, UK, 2025. [Google Scholar]
- Glancy, F.H.; Yadav, S.B. A computational model for financial reporting fraud detection. Decis. Support Syst. 2011, 50, 595–601. [Google Scholar] [CrossRef]
- Kalapaaking, A.P.; Khalil, I.; Rahman, M.S.; Atiquzzaman, M.; Yi, X.; Almashor, M. Blockchain-based federated learning with secure aggregation in trusted execution environment for Internet-of-Things. IEEE Trans. Ind. Informat. 2023, 19, 1703–1714. [Google Scholar] [CrossRef]
- Wang, Z.; Hu, Q.; Li, R.; Xu, M.; Xiong, Z. Incentive mechanism design for joint resource allocation in blockchain-based federated learning. IEEE Trans. Parallel Distrib. Syst. 2023, 34, 1536–1547. [Google Scholar] [CrossRef]
- Nguyen, D.C.; Hosseinalipour, S.; Love, D.J.; Pathirana, P.N.; Brinton, C.G. Latency Optimization for Blockchain-Empowered Federated Learning in Multi-Server Edge Computing. IEEE J. Sel. Areas Commun. 2022, 40, 3373–3390. [Google Scholar] [CrossRef]
- Kumar Sharma, P.; Gope, P.; Puthal, D. Blockchain and Federated Learning-Enabled Distributed Secure and Privacy-Preserving Computing Architecture for IoT Network. In Proceedings of the 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Genoa, Italy, 27–30 June 2022; pp. 1–9. [Google Scholar] [CrossRef]
- Li, W.; Yang, B.; Song, Y. Secure multi-party computing for financial sector based on blockchain. In Proceedings of the 2023 IEEE 14th International Conference on Software Engineering and Service Science (ICSESS), Beijing, China, 17–18 October 2023; pp. 145–151. [Google Scholar]
- Albrecht, J.P. How the GDPR will change the world. Eur. Data Prot. Law Rev. 2016, 2, 287–289. [Google Scholar] [CrossRef]
- Martínez, Ó.; Sánchez, P.; Alcaraz, E. A Review of Machine Learning and Deep Learning Approaches for Fraud Detection Across Financial and Supply Chain Domains. Res. Sq. 2025, preprint. [Google Scholar]
- Zhou, Z.; Chen, X.; Li, E.; Zeng, L.; Luo, K.; Zhang, J. Edge intelligence: Paving the last mile of artificial intelligence with edge computing. Proc. IEEE 2019, 107, 1738–1762. [Google Scholar] [CrossRef]
- Saha, S.; Ahmad, T. Federated transfer learning: Concept and applications. Intell. Artif. 2021, 15, 35–44. [Google Scholar] [CrossRef]
- Zhao, Y.; Zhao, J.; Yang, M.; Wang, T.; Wang, N.; Lyu, L.; Niyato, D.; Lam, K.-Y. Local differential privacy-based federated learning for internet of things. IEEE Internet Things J. 2020, 8, 8836–8853. [Google Scholar] [CrossRef]
- Bonawitz, K.; Ivanov, V.; Kreuter, B.; Marcedone, A.; McMahan, H.B.; Patel, S.; Ramage, D.; Segal, A.; Seth, K. Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA, 30 October–3 November 2017; pp. 1175–1191. [Google Scholar]
- Zhuang, Y.; Liu, Z.; Qian, P.; Liu, Q.; Wang, X.; He, Q. Smart Contract Vulnerability Detection Using Graph Neural Networks. In Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence (IJCAI), Yokohama, Japan, 19–27 August 2021; pp. 3283–3290. [Google Scholar]
- Caron, M.; Touvron, H.; Misra, I.; Jégou, H.; Mairal, J.; Bojanowski, P.; Joulin, A. Emerging properties in self-supervised vision transformers. In Proceedings of the IEEE/CVF International Conference on Computer Vision, Virtual, 10–17 October 2021; pp. 9650–9660. [Google Scholar]
- Dosovitskiy, A. An image is worth 16x16 words: Transformers for image recognition at scale. arXiv 2020, arXiv:2010.11929. [Google Scholar]
- Younesi, A.; Ansari, M.; Fazli, M.; Ejlali, A.; Shafique, M.; Henkel, J. A comprehensive survey of convolutions in deep learning: Applications, challenges, and future trends. IEEE Access 2024, 12, 41180–41218. [Google Scholar] [CrossRef]
- Ren, Y.; Li, Y.; Feng, G.; Zhang, X. Privacy-enhanced and verification-traceable aggregation for federated learning. IEEE Internet Things J. 2022, 9, 24933–24948. [Google Scholar] [CrossRef]
- Cheng, Y.; Liu, Y.; Chen, T.; Yang, Q. Federated Learning for Privacy-Preserving AI. Commun. ACM 2020, 63, 33–36. [Google Scholar] [CrossRef]
- Shahid, O.; Pouriyeh, S.; Parizi, R.M.; Sheng, Q.Z.; Srivastava, G.; Zhao, L. Communication efficiency in federated learning: Achievements and challenges. arXiv 2021, arXiv:2107.10996. [Google Scholar] [CrossRef]
- Arora, S.; Beams, A.; Chatzigiannis, P.; Meiser, S.; Patel, K.; Raghuraman, S.; Rindal, P.; Shah, H.; Wang, Y.; Wu, Y.; et al. Privacy-Preserving Financial Anomaly Detection via Federated Learning & Multi-Party Computation. In Proceedings of the 2024 Annual Computer Security Applications Conference Workshops (ACSAC Workshops), Austin, TX, USA, 9–13 December 2024; pp. 270–279. [Google Scholar]
- Creswell, A.; White, T.; Dumoulin, V.; Arulkumaran, K.; Sengupta, B.; Bharath, A.A. Generative adversarial networks: An overview. IEEE Signal Process. Mag. 2018, 35, 53–65. [Google Scholar] [CrossRef]
- Bonawitz, K.; Eichner, H.; Grieskamp, W.; Huba, D.; Ingerman, A.; Ivanov, V.; Kiddon, C.; Konečný, J.; Mazzocchi, S.; McMahan, H.B.; et al. Towards federated learning at scale: System design. In Proceedings of the Machine Learning and Systems, Stanford, CA, USA, 31 March–2 April 2019; Volume 1, pp. 374–388. [Google Scholar]
- Li, Q.; Wen, Z.; Wu, Z.; Hu, S.; Wang, N.; Li, Y.; Liu, X.; He, B. A survey on federated learning systems: Vision, hype and reality for data privacy and protection. IEEE Trans. Knowl. Data Eng. 2021, 35, 3347–3366. [Google Scholar] [CrossRef]
- Issa, W.; Moustafa, N.; Turnbull, B.; Sohrabi, N.; Tari, Z. Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey. ACM Comput. Surv. 2023, 55, 1–43. [Google Scholar] [CrossRef]
- Yuan, S.; Cao, B.; Sun, Y.; Wan, Z.; Peng, M. Secure and Efficient Federated Learning through Layering and Sharding Blockchain. IEEE Trans. Netw. Sci. Eng. 2024, 11, 3120–3134. [Google Scholar] [CrossRef]
- Zamani, M.; Movahedi, M.; Raykova, M. RapidChain: Scaling blockchain via full sharding. In Proceedings of the CCS’18: 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada, 15–19 October 2018; pp. 931–948. [Google Scholar]
- Qu, Y.; Gao, L.; Xiang, Y.; Shen, S.; Yu, S. FedTwin: Blockchain-Enabled Adaptive Asynchronous Federated Learning for Digital Twin Networks. IEEE Netw. 2022, 36, 183–190. [Google Scholar] [CrossRef]
- Bolívar, A.; García, V.; Alejo, R.; Florencia-Juárez, R.; Sánchez, J.S. Data-centric solutions for addressing big data veracity with class imbalance, high dimensionality, and class overlapping. Appl. Sci. 2024, 14, 5845. [Google Scholar] [CrossRef]
- Zhu, X.; Bai, L.; Ruan, Y. Federated Class-Incremental Learning: A Survey. In Proceedings of the 2025 10th International Conference on Machine Learning Technologies (ICMLT), Helsinki, Finland, 23–25 May 2025; pp. 218–222. [Google Scholar]
- Konečný, J.; McMahan, H.B.; Yu, F.X.; Richtárik, P.; Suresh, A.T.; Bacon, D. Federated Learning: Strategies for Improving Communication Efficiency. arXiv 2016, arXiv:1610.05492. [Google Scholar]
- Qi, J.; Lin, F.; Chen, Z.; Tang, C.; Jia, R.; Li, M. High-quality model aggregation for blockchain-based federated learning via reputation-motivated task participation. IEEE Internet Things J. 2022, 9, 18378–18391. [Google Scholar] [CrossRef]
- Pranto, T.H.; Hasib, K.T.A.M.; Rahman, T.; Haque, A.B.; Islam, A.K.M.N.; Rahman, R.M. Blockchain and Machine Learning for Fraud Detection: A Privacy-Preserving and Adaptive Incentive Based Approach. IEEE Access 2022, 10, 87115–87134. [Google Scholar] [CrossRef]
- Mothukuri, V.; Khare, P.; Parizi, R.M.; Pouriyeh, S.; Dehghantanha, A.; Srivastava, G. Federated-learning-based anomaly detection for IoT security attacks. IEEE Internet Things J. 2021, 9, 2545–2554. [Google Scholar] [CrossRef]
- Nishio, T.; Yonetani, R. Client selection for federated learning with heterogeneous resources in mobile edge. In Proceedings of the ICC 2019-2019 IEEE international conference on communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–7. [Google Scholar]
- Shi, W.; Cao, J.; Zhang, Q.; Li, Y.; Xu, L. Edge computing: Vision and challenges. IEEE Internet Things J. 2016, 3, 637–646. [Google Scholar] [CrossRef]
- Shafiq, M.; Gu, Z. Deep residual learning for image recognition: A survey. Appl. Sci. 2022, 12, 8972. [Google Scholar] [CrossRef]
- Papernot, N.; Abadi, M.; Erlingsson, U.; Goodfellow, I.; Talwar, K. Semi-supervised knowledge transfer for deep learning from private training data. arXiv 2016, arXiv:1610.05755. [Google Scholar]
- Ha, T.; Dang, T.K.; Dang, T.T.; Truong, T.A.; Nguyen, M.T. Differential privacy in deep learning: An overview. In Proceedings of the 2019 International Conference on Advanced Computing and Applications (ACOMP), Nha Trang, Vietnam, 26–28 November 2019; pp. 97–102. [Google Scholar]
- Madry, A.; Makelov, A.; Schmidt, L.; Tsipras, D.; Vladu, A. Towards deep learning models resistant to adversarial attacks. arXiv 2017, arXiv:1706.06083. [Google Scholar]
- Zhang, H.; Yu, Y.; Jiao, J.; Xing, E.; El Ghaoui, L.; Jordan, M. Theoretically principled trade-off between robustness and accuracy. In Proceedings of the International Conference on Machine Learning, Long Beach, CA, USA, 9–15 June 2019; pp. 7472–7482. [Google Scholar]
- Wong, E.; Kolter, Z. Provable defenses against adversarial examples via the convex outer adversarial polytope. In Proceedings of the International Conference on Machine Learning, Stockholm, Sweden, 10–15 July 2018; pp. 5286–5295. [Google Scholar]
- Hanae, A.; Youssef, G. Synergy of Machine Learning and Blockchain Strategies for Transactional Fraud Detection in FinTech Systems. In Proceedings of the 2024 11th International Conference on Future Internet of Things and Cloud (FiCloud), Vienna, Austria, 19–21 August 2024; pp. 292–297. [Google Scholar]
- Liu, J.; He, X.; Sun, R.; Du, X.; Guizani, M. Privacy-Preserving Data Sharing Scheme with FL via MPC in Financial Permissioned Blockchain. In Proceedings of the ICC 2021—IEEE International Conference on Communications, Montreal, QC, Canada, 14–23 June 2021; pp. 1–6. [Google Scholar] [CrossRef]
- Wan, Y.; Qu, Y.; Gao, L.; Xiang, Y. Privacy-Preserving Blockchain-Enabled Federated Learning for B5G-Driven Edge Computing. Comput. Netw. 2022, 204, 108671. [Google Scholar]
- Zhao, Y.; Zhao, J.; Jiang, L.; Tan, R.; Niyato, D.; Li, Z.; Lyu, L.; Liu, Y. Privacy-Preserving Blockchain-Based Federated Learning for IoT Devices. IEEE Internet Things J. 2020, 8, 1817–1829. [Google Scholar] [CrossRef]
- Miao, Y.; Liu, Z.; Li, H.; Choo, K.-K.R.; Deng, R.H. Privacy-Preserving Byzantine-Robust Federated Learning via Blockchain Systems. IEEE Trans. Inf. Forensics Secur. 2022, 17, 2848–2861. [Google Scholar] [CrossRef]
- Huang, W.; Li, T.; Wang, D.; Du, S.; Zhang, J.; Huang, T. Fairness and Accuracy in Horizontal Federated Learning. Inf. Sci. 2022, 589, 170–185. [Google Scholar] [CrossRef]
- Mohri, M.; Sivek, G.; Suresh, A.T. Agnostic federated learning. In Proceedings of the International Conference on Machine Learning, Long Beach, CA, USA, 9–15 June 2019; pp. 4615–4625. [Google Scholar]



| Element | Description | Examples |
|---|---|---|
| Population | Application area where anomaly detection is applied | Financial transactions, credit card transactions, banking data |
| Intervention | Methodology/technology used | Machine learning, federated learning, blockchain |
| Comparison | Alternative methods compared against current ones | Supervised learning, centralized ml, blockchain-based methods |
| Outcome | Results of the intervention | Improved accuracy, reduced false positives, real-time detection |
| Context | Setting where applied | Financial institutions, banking systems, e-commerce platforms |
| Exclusion | Inclusion | |
|---|---|---|
| 1 | Articles that do not focus on financial fraudulent transactions. | Articles that were conducted from 2020 to 2025. |
| 2 | Articles that do not concern the use of machine learning methods/blockchain technology/federated learning | Articles that focus on financial fraud detection and ML methods based on blockchain technologies and federated learning. |
| 3 | Articles that are in the form of abstracts, short papers, newspapers, posters, and book chapters. | A peer- reviewed research article or systematic literature review |
| 4 | Studies that were not published in the English language. | Studies were conducted in English only. |
| 5 | Studies that do not mention their performance evaluation metrics | Only review journal or conference papers related to financial fraud detection. |
| References | Algorithm | Type (FL/ML) | Reported Results | Description |
|---|---|---|---|---|
| [22,57,58] | FedAvg Federated Averaging | Federated Learning | 85–92% accuracy, 0.89 F1-scorep | Aggregates local model updates from distributed nodes while preserving data privacy x |
| [4,10,31,59,60] | Support Vector Machine (SVM) | Machine Learning | 94% precision, 0.91 recall | Uses hyperplanes to classify data and is effective for high dimensional spaces |
| [17,61,62,63] | Random Forest | Machine Learning | AUC-ROC 0.95-0.97 86–94% accuracy | Collective of D.Tree with feature bagging/strong to overfitting |
| [32,64,65] | LSTM Autoencoders | Federated Learning | 88% anomaly detection rate | Neural networks for sequential data anomaly detection in decentralized settings |
| [6,57,59,62,66] | XGBoost | Machine Learning | 95% accuracy, 0.93 F1-score | Gradient-boosted trees with regularization to prevent overfitting and handles class imbalance |
| [67,68,69] | Federated XGBoost | Federated Learning | 90% accuracy, 0.88 AUC | Distributed version of XGboost with secure aggregation |
| [70,71,72] | Graphical Neural Networks | Machine Learning | 89% fraud recall | Analyzes transaction graphs to detect suspicious network patterns |
| [73,74,75,76] | FedProx | Federated Learning | 91% accuracy (handles non-IID data) | FL variant with proximal term to address data heterogeneity |
| [27,77,78,79] | Differential Privacy FL | Federated Learning | 87% accuracy (ϵ = 2.0) | Adds noise to model updates to assure privacy |
| [80,81,82] | Q-Learning (RL) | Federated Learning | 93% adaptive fraud detection | Reinforcement learning for dynamic policy updates in decentralized systems |
| [17,22] | Decision Tree (DT) | Machine Learning | 89–92% accuracy | Interpretable but inclined to overfitting |
| [3,17] | Logistic Regression (LR) | Machine Learning | 85–88% AUC-ROC | Predicts binary outcomes via logistic function, simple but limited to linear patterns and mostly used for financial mismanagement |
| [5,83] | Deep Neural Networks (DNNs) | Machine Learning | 90–93% F1-score | Multi-layerpperceptrons for complex pattern detection; needs large data |
| [1,64] | Autoencoders | Machine Learning/Federated Learning | 88–91% anomaly detection accuracy | Unsupervised NN for reconstruction error-based anomaly detection; learns normal patterns, detects deviations |
| [14,84,85,86] | Isolation Forest (IF) | Machine Learning | 89% detection rate (↑ speed vs. OC-SVM) | Unsupervised plus isolates irregularities via random splits in feature space and works with high-dim data |
| [7,63,87] | K-Means Clustering | Machine Learning | 77–85% cluster purity | Groups similar transactions, e.g., money laundering and it groups similar transactions based on feature similarity. Used to detect unusual money flow patterns. |
| [17,60] | AdaBoost | Machine Learning | 93% accuracy (imbalanced data) | Ensemble method with adaptive boosting and focuses on misclassified samples |
| [6,17,62,66] | LightGBM | Machine Learning | 94% AUC-ROC | Gradient-boosting framework optimized for speed and efficiency |
| [61,88] | SMOTE + RF | Machine Learning | 91% recall (class-imbalanced data) | Combines synthetic minority and oversampling with Random Forest |
| [89,90,91] | Transformer Models | Machine Learning | 92% F1-score (sequential fraud) | Self-attention mechanisms for contextual fraud design detection |
| [4,10] | Hybrid SVM-DT | Machine Learning | 90% precision | Combines SVM’s margin maximization with DT interpretability |
| [82,92] | Deep Reinforcement Learning | Federated Learning | 95% adaptive accuracy | Learns fraud policies through reward-based systems in surroundings of FL |
| [93,94] | Homomorphic Encryption FL | Federated Learning | 86% accuracy (privacy-preserving) | Enables computations on encrypted data for safe FL |
| [95,96] | Zero-Knowledge Proof FL | Federated Learning | 88% verifiable accuracy | Validates model integrity without revealing raw data |
| Ref | Metric | Formula | Interpretation | When to Use | Trade-Offs |
|---|---|---|---|---|---|
| [3,17,21,66] | Accuracy | (TP + TN)/(TP + TN + FP + FN) | Overall correctness of predictions | Balanced datasets | Misleading for imbalanced data (rare fraud) |
| [17,31,59,66,70] | Precision | TP/(TP + FP) | % of predicted frauds that are actual frauds | When FP costs are high (e.g., false alarms) | High precision → low recall |
| [6,108] | Recall (Sensitivity) | TP/(TP + FN) | % of actual frauds correctly detected | When FN costs are high (e.g., missed frauds) | High recall → low precision |
| [8,17,42,56,66,68] | F1-Score | 2 × (Precision × Recall)/(Precision + Recall) | Harmonic mean of precision and recall | Balanced view of both FP and FN | Favors models with similar precision/recall |
| [9,21,88] | Specificity | TN/(TN + FP) | % of legitimate transactions correctly identified | When FP reduction is critical | Less emphasized in fraud detection |
| [6,21,34,67,71,83,108] | AUC-ROC | Area under ROC curve | Model’s ability to distinguish fraud vs. non-fraud across thresholds | Overall performance comparison | Insensitive to class imbalance |
| [3,109,110,111] | False Positive Rate (FPR) | FP/(FP + TN) | % of legitimate transactions flagged as fraud | Cost analysis of false alarms | Lower FPR → higher threshold → potential high FN |
| [30,40,101] | False Negative Rate (FNR) | FN/(FN + TP) | % of frauds missed by the model | Risk assessment of undetected fraud | Lower FNR → lower threshold → potential high FP |
| [33,43,84,87,109,110] | Precision-Recall Curve (AUC-PR) | Area under P-R curve | Performance under class imbalance (focus on fraud class) | Highly imbalanced datasets | More informative than ROC when fraud is rare |
| [21,58,112,113] | Matthews Correlation Coefficient (MCC) | (TP × TN − FP × FN)/√((TP + FP)(TP + FN)(TN + FP)(TN + FN)) | Balanced measure for binary classification | When all four confusion matrix categories are important | More reliable for imbalanced data than accuracy |
| [20,61,63,86,88] | G-Mean | √(Recall × Specificity) | Geometric mean of sensitivity and specificity | Imbalanced datasets where both classes matter | Less sensitive to majority class than accuracy |
| [3,53,114] | Balanced Accuracy | (Recall + Specificity)/2 | Average of recall and specificity | Imbalanced classification problems | Simpler alternative to G-Mean |
| [31,59,96] | Detection Prevalence | (TP + FP)/Total | Proportion of cases flagged as fraud | Understanding system’s alerting behavior | Does not measure correctness, just volume of alerts |
| [6,56,115] | Positive Predictive Value (PPV) | TP/(TP + FP) | Same as precision | When focusing on predictive value of positive cases | Synonym for precision |
| [9,21,116] | Negative Predictive Value (NPV) | TN/(TN + FN) | % of predicted negatives that are actual negatives | When focusing on predictive value of negatives | Less commonly used in fraud detection |
| [84,87] | Youden’s J Index | Recall + Specificity − 1 | Combines sensitivity and specificity | Finding optimal threshold | Ranges from −1 to 1 (1 = perfect test) |
| [17,59,74,80] | Lift Score | (TP/(TP + FP)) ÷ ((TP + FN)/Total) | How much better model performs than random models | Marketing and business applications | Depends on base rate of positive class |
| [3,114,117] | Cost-Sensitive Accuracy | (w1 × TN + w2 × TP)/Total | Accuracy with different weights for classes | When misclassification costs are unequal | Requires domain knowledge to set weights |
| [30,101,110] | Expected Cost | C10 × FP + C01 × FN | Total expected cost of misclassifications | When costs of FP and FN are known | Requires accurate cost estimates |
| References | Fraud Type | Subcategories | Key Characteristics | Detection Challenges |
|---|---|---|---|---|
| [3,5,9,60,62] | Credit Card Fraud | - Online/offline transactions | Unauthorized use of card data via phishing/skimming. | Class imbalance plus real-time detection. |
| [23,30,121] | Financial Statement Fraud | - Earnings manipulation | Faking records to inflate profits or hide losses. | Complex patterns, lack of labeled data. |
| [59,109,113,122] | Bitcoin/Crypto Fraud | - Wash trading, phishing, exchange hacks, flash loan attacks | Exploits blockchain pseudonymity, irreversible transactions. | Anonymity-evolving tactics. |
| [7,61,87,111] | Insurance Fraud | - Healthcare, auto claims | Exaggerated/false claims to illicitly obtain payouts. | High-volume claims and subtle manipulations. |
| [34,68,80,123] | Online Payment Fraud | - Account takeover, chargeback fraud | Targets e-wallets, banking apps, or payment gateways. | Dynamic attack vectors and false positives. |
| [96,124,125,126] | Identity Theft | - Synthetic identities | Combining real/fake data to create fraudulent identities. | Linking disparate data sources, early detection. |
| [28,52,114,127] | Healthcare Fraud | - Billing for unused services/prescription fraud | Upcoding, unbundling, or phantom procedures/altered prescriptions | Complex regulations, large datasets/Doctor-patient collusion |
| [11,121,128] | Tax Fraud | - False deductions/offshore evasion | Inflating expenses or hiding income/hiding assets in untraceable accounts | Legal against fraudulent ambiguity, sparse labels. |
| [24,33,35,129] | E-commerce Fraud | - Fake reviews/non-delivery scams | Paid or bot-generated reviews to manipulate rankings/seller accepts payment but never ships goods. | NLP challenges, fake sentiment detection/short-lived schemes. |
| [10,108,130] | Mortgage Fraud | - Income/asset falsification/property flipping scams | Inflating borrower qualifications for loans. | Document forgery detection. |
| [112,131] | Employment Fraud | - Fake credentials | Lying about qualifications or experience. | Background check limitations |
| [132,133,134] | Telecom Fraud | - Subscription fraud | Fake IDs to obtain phones/services without payment. | Rapid onboarding, burner phones. |
| [1,89,109,135] | Social Media Fraud | - Fake followers/engagement/impersonation scams | Bots or farms inflating metrics for influence/fake profiles mimicking real ones | Evolving bot behaviors. |
| [27,136] | Public Sector Fraud | -Grant fraud - Procurement fraud - Benefits fraud | Bid rigging and false entitlement claims | Political sensitivities in detection |
| [137,138] | Supply Chain Fraud | - Counterfeit goods - Invoice manipulation - Cargo -theft | Fake documentation and diverted shipments | Multi-party coordination gaps |
| [73,113,122] | Investment Fraud | -Pump-and-dump - Boiler rooms | Artificial price inflation and fake returns | Distinguishing from legitimate volatility |
| [139,140] | Academic Fraud | - Paper mills - Degree forgery - Plagiarism | Fake research and credentialing | Verification across institutions |
| [14,78,141,142] | AI/ML System Fraud | - Model poisoning - Adversarial examples - Data leakage | Attacks on fraud detection systems themselves | Arms race with attackers |
| [27] | Charity Fraud | -Fake disasters - Misused donations - Ghost beneficiaries | Exploits humanitarian crises | Reputation damage risks |
| [24,135] | Rental Fraud | - Phantom rentals - Fake listings - Deposit theft | Duplicate programs with stolen photos | Geospatial verification needs |
| Fraud Type | Number of Papers (N) |
|---|---|
| Credit Card Fraud | ~10 |
| Financial Statement Fraud | ~10 |
| Bitcoin/Crypto Fraud | ~4 |
| Insurance Fraud | ~3 |
| Online Payment Fraud | ~3 |
| Identity Theft | ~3 |
| Healthcare Fraud | ~2 |
| Tax Fraud | ~2 |
| E-commerce Fraud | ~2 |
| Mortgage Fraud | ~2 |
| Employment Fraud | ~2 |
| Telecom Fraud | ~2 |
| Social Media Fraud | ~2 |
| Public Sector Fraud | ~2 |
| Supply Chain Fraud | ~2 |
| Investment Fraud | ~2 |
| Academic Fraud | ~2 |
| AI/ML System Fraud | ~2 |
| Charity Fraud | ~2 |
| Rental Fraud | ~2 |
| Ref | Aspect | Federated Learning (FL) | Machine Learning (ML) |
|---|---|---|---|
| [56,57,68,151] | Data Handling | Decentralized: Data remains on local devices; only model updates are shared via blockchain. | Centralized: Data is aggregated into a single repository for training. |
| [6,77,78,100,152] | Privacy | Enhanced privacy: Raw data never leaves local nodes, reducing exposure to breaches. Differential privacy and homomorphic encryption further protect updates. | Privacy risks: Sensitive data must be shared centrally, increasing vulnerability to leaks or misuse. |
| [11,14,18,41,153,154] | Security | High security: Blockchain ensures tamper-proof records of model updates and consensus validation. Resistant to poisoning attacks via decentralized validation. | Vulnerable to attacks: Centralized data repositories are prime targets for breaches (e.g., SQL injection, model inversion). |
| [53,60,73,155,156] | Scalability | Scalable for distributed systems: Participants (e.g., banks) contribute without data centralization. Sharding improves efficiency. | Limited by central infrastructure: Large datasets require significant storage/compute resources. |
| [11,28,131,157] | Computational Load | Distributed computation across nodes, but blockchain consensus (e.g., PoW/PoS) adds overhead. Optimized via lightweight consensus (e.g., PBFT). | Centralized computation: Requires powerful servers but avoids blockchain overhead. |
| [27,100,136] | Regulatory Compliance | Easier compliance: Data localization laws (e.g., GDPR) are respected as data stays local. Supports “right to be forgotten” via smart contracts. | Challenging compliance: Cross-border data sharing may violate privacy regulations (e.g., GDPR Article 44–50). |
| [24,42,104,158,159,160] | Model Performance | Depends on data diversity: Benefits from diverse datasets but may suffer from non-IID data challenges. Techniques like FedAvg mitigate bias. | Potentially higher accuracy: Centralized data allows full visibility for model optimization (e.g., hyperparameter tuning). |
| [8,34,40,112] | Use Cases | Multi-institutional collaboration (e.g., banks detecting cross-border fraud without sharing data). | Single-organization fraud detection (e.g., a bank using its internal transaction data). |
| [3,59,60,70] | Fraud Detection Accuracy | Adaptive to new fraud patterns via collaborative learning but may lag in real-time detection due to aggregation delays. | High accuracy for known fraud patterns with centralized data but struggles with zero-day attacks. |
| [29,129,132,161] | Incentive Mechanisms | Blockchain-enabled incentives (e.g., tokens) reward participants for contributing updates. Smart contracts automate payouts. | No native incentive model: Relies on organizational budgets for data sharing and model training. |
| [29,71,96,162] | Transparency | Immutable audit trails via blockchain; federated models are explainable but require privacy-preserving techniques (e.g., zk-SNARKs). | Centralized models can be audited but lack transparency in data provenance. |
| [133,163,164,165,166] | Latency | Higher latency due to decentralized consensus and aggregation rounds. Edge computing mitigates delays. | Lower latency: Real-time processing feasible with centralized infrastructure. |
| [28,53,131,157] | Resource Efficiency | Optimizes resource usage by distributing compute load but requires energy for blockchain operations. | Efficient for single-entity deployments but scales poorly for multi-party scenarios. |
| [65,153,167,168,169,170,171] | Adversarial Robustness | Resilient to adversarial attacks via decentralized validation and differential privacy. | Vulnerable to adversarial examples (e.g., evasion attacks) due to centralized training. |
| [26,36,140,151] | Interoperability | Supports cross-platform collaboration via standardized FL frameworks (e.g., FATE, OpenFL). | Limited interoperability: Models trained on proprietary datasets are siloed. |
| [27,96,172] | Regulatory Auditing | Blockchain enables automated compliance checks (e.g., GDPR) via smart contracts. | Manual auditing processes are time-consuming and error-prone. |
| [53,59,103,132] | Cost | Reduced data storage costs (local retention) but higher operational costs for blockchain maintenance. | High infrastructure costs for centralized data centers and security measures. |
| [20,24,40] | Real-World Adoption | Emerging in finance (e.g., cross-bank fraud detection) and healthcare (e.g., federated EHR analysis). | Dominates enterprise fraud detection (e.g., credit card fraud) due to maturity. |
| References | Aspect | Machine Learning (ML) | Federated Learning (FL) | Hybrid Blockchain–FL |
|---|---|---|---|---|
| [31,33,34,40] | Data Access | Centralized; all data aggregated on a single server for training. | Decentralized; data remain on client nodes, only model updates shared. | Decentralized + ledger-based; each node records updates immutably on blockchain. |
| [14,27,71,77] | Privacy and Security | Low to direct exposure of sensitive data; prone to leakage. | High, no raw data transfer; protected by secure aggregation and differential privacy. | Very high, adds blockchain auditability and smart-contract control; integrates differential privacy. |
| [17,34,38,73] | Accuracy and Performance | 93–95% accuracy (e.g., XGboost, SVM) with full data visibility. | 85–92% accuracy; sometimes reduced due to data heterogeneity. | 90–93%; improves model robustness through verified aggregation. |
| [11,28,133,158] | Scalability | Limited—requires large, centralized compute resources. | High—distributed across institutions; handles non-IID data with FedProx/FedAvg. | Very high—blockchain + sharding allow parallel cross-silo updates. |
| [27,71,160] | Regulatory Compliance | Difficult—cross-border data sharing breaches GDPR. | Strong—data stay local, enabling GDPR/HIPAA compliance. | Strongest—smart contracts ensure traceability and “right to be forgotten.” |
| [6,42,136,152] | Computational Cost and Efficiency | High server and storage costs. | Moderate, distributed load but requires secure communication channels. | Moderate—initial blockchain overhead offset by shared infrastructure. |
| [24,30,31,33] | Practical Applications | Credit card, AML, and insurance fraud detection. | Cross-bank and healthcare data collaboration. | Consortium banking and fintech networks using blockchain audit trails. |
| [38,71] | Representative Studies | Systematic review of ML vs. FL trade-offs. | DP framework for FL in financial fraud. | Reference architecture for blockchain-enabled FL. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Farrukh, H.; Zafar, S.; Rehman, Z.U.; Shah, A.A.; Alshammry, N. Blockchain-Based Fraud Detection: A Comparative Systematic Literature Review of Federated Learning and Machine Learning Approaches. Electronics 2025, 14, 4952. https://doi.org/10.3390/electronics14244952
Farrukh H, Zafar S, Rehman ZU, Shah AA, Alshammry N. Blockchain-Based Fraud Detection: A Comparative Systematic Literature Review of Federated Learning and Machine Learning Approaches. Electronics. 2025; 14(24):4952. https://doi.org/10.3390/electronics14244952
Chicago/Turabian StyleFarrukh, Halima, Sidra Zafar, Zia Ul Rehman, Asghar Ali Shah, and Nizal Alshammry. 2025. "Blockchain-Based Fraud Detection: A Comparative Systematic Literature Review of Federated Learning and Machine Learning Approaches" Electronics 14, no. 24: 4952. https://doi.org/10.3390/electronics14244952
APA StyleFarrukh, H., Zafar, S., Rehman, Z. U., Shah, A. A., & Alshammry, N. (2025). Blockchain-Based Fraud Detection: A Comparative Systematic Literature Review of Federated Learning and Machine Learning Approaches. Electronics, 14(24), 4952. https://doi.org/10.3390/electronics14244952

