Federated Learning-Based Framework for Privacy-Protected Cross-Border Financial Risk Evaluation: Analyzing US-Asia Investment Flows

Main Article Content

Yiyi Cai

Abstract

This paper presents a novel federated learning framework for privacy-preserving cross-border financial risk assessment, specifically focused on US-Asia investment flows. Cross-border financial transactions face significant challenges in risk assessment due to disparate regulatory environments, data sovereignty requirements, and privacy constraints across jurisdictions. Our proposed architecture addresses these challenges through a multi-layered approach that incorporates differential privacy, homomorphic encryption, and secure aggregation techniques while enabling collaborative model training without raw data exchange. Experimental results demonstrate that the proposed framework achieves 94.5% detection accuracy with 217ms latency in real-world case studies, outperforming conventional federated learning approaches by 4.3-7.2% across key performance metrics while maintaining regulatory compliance. The architecture reduces false positives by 73% compared to baseline methods while preserving data locality requirements. Privacy protection analysis confirms resilience against multiple attack vectors with only 0.4% model inversion success rate compared to 7.2% for state-of-the-art alternatives. This research establishes a foundation for enhanced cross-jurisdictional financial risk assessment that balances analytical capabilities with strict privacy preservation, enabling financial institutions to develop more sophisticated risk models across US and Asian markets without compromising regulatory compliance or data sovereignty.

Article Details

Section

Articles

How to Cite

Federated Learning-Based Framework for Privacy-Protected Cross-Border Financial Risk Evaluation: Analyzing US-Asia Investment Flows. (2025). Journal of Sustainability, Policy, and Practice, 1(4), 50-65. https://schoalrx.com/index.php/jspp/article/view/54

References

1. J. Fan, T. K. Trinh, and H. Zhang, "Deep learning-based transfer pricing anomaly detection and risk alert system for pharmaceutical companies: A data security-oriented approach," Journal of Advanced Computing Systems, vol. 4, no. 2, pp. 1-14, 2024.

2. W. Bi, T. K. Trinh, and S. Fan, "Machine learning-based pattern recognition for anti-money laundering in banking systems," Journal of Advanced Computing Systems, vol. 4, no. 11, pp. 30-41, 2024. doi: 10.69987/jacs.2024.41103

3. S. Zhang, Z. Feng, and B. Dong, "LAMDA: Low-latency anomaly detection architecture for real-time cross-market financial decision support," Academia Nexus Journal, vol. 3, no. 2, 2024.

4. Z. Wang, X. Wang, and H. Wang, "Temporal graph neural networks for money laundering detection in cross-border transactions," Academia Nexus Journal, vol. 3, no. 2, 2024.

5. A. Kang, J. Xin, and X. Ma, "Anomalous cross-border capital flow patterns and their implications for national economic security: An empirical analysis," Journal of Advanced Computing Systems, vol. 4, no. 5, pp. 42-54, 2024. doi: 10.69987/jacs.2024.40504

6. J. Liang, C. Zhu, and Q. Zheng, "Developing evaluation metrics for cross-lingual LLM-based detection of subtle sentiment manipulation in online financial content," Journal of Advanced Computing Systems, vol. 3, no. 9, pp. 24-38, 2023. doi: 10.69987/jacs.2023.30903

7. Z. Wang, and J. Liang, "Comparative analysis of interpretability techniques for feature importance in credit risk assessment," Spectrum of Research, vol. 4, no. 2, 2024.

8. B. Dong, and Z. Zhang, "AI-driven framework for compliance risk assessment in cross-border payments: Multi-jurisdictional challenges and response strategies," Spectrum of Research, vol. 4, no. 2, 2024.

9. J. Wang, L. Guo, and K. Qian, "LSTM-based heart rate dynamics prediction during aerobic exercise for elderly adults," 2025. doi: 10.20944/preprints202504.1692.v1

10. D. Ma, M. Shu, and H. Zhang, "Feature selection optimization for employee retention prediction: A machine learning approach for human resource management," 2025. doi: 10.20944/preprints202504.1549.v1

11. M. Li, D. Ma, and Y. Zhang, "Improving database anomaly detection efficiency through sample difficulty estimation," 2025. doi: 10.20944/preprints202504.1527.v1

12. K. Yu, Y. Chen, T. K. Trinh, and W. Bi, "Real-time detection of anomalous trading patterns in financial markets using generative adversarial networks," 2025. doi: 10.54254/2755-2721/2025.22016

13. C. Ju, and T. K. Trinh, "A machine learning approach to supply chain vulnerability early warning system: Evidence from US semiconductor industry," Journal of Advanced Computing Systems, vol. 3, no. 11, pp. 21-35, 2023.

14. G. Rao, T. K. Trinh, Y. Chen, M. Shu, and S. Zheng, "Jump prediction in systemically important financial institutions' CDS prices," Spectrum of Research, vol. 4, no. 2, 2024.

15. X. Xiao, H. Chen, Y. Zhang, W. Ren, J. Xu, and J. Zhang, "Anomalous payment behavior detection and risk prediction for SMEs based on LSTM-attention mechanism," Academic Journal of Sociology and Management, vol. 3, no. 2, pp. 43-51, 2025. doi: 10.70393/616a736d.323733

16. X. Xiao, Y. Zhang, H. Chen, W. Ren, J. Zhang, and J. Xu, "A differential privacy-based mechanism for preventing data leakage in large language model training," Academic Journal of Sociology and Management, vol. 3, no. 2, pp. 33-42, 2025. doi: 10.70393/616a736d.323732

17. J. Zhang, X. Xiao, W. Ren, and Y. Zhang, "Privacy-preserving feature extraction for medical images based on fully homomorphic encryption," Journal of Advanced Computing Systems, vol. 4, no. 2, pp. 15-28, 2024.

18. X. Hu and R. Caldentey, "Trust and reciprocity in firms’ capacity sharing," Manufacturing & Service Operations Management, vol. 25, no. 4, pp. 1436–1450, 2023, doi: 10.1287/msom.2023.1203.

19. B. Dong, and T. K. Trinh, "Real-time early warning of trading behavior anomalies in financial markets: An AI-driven approach," Journal of Economic Theory and Business Management, vol. 2, no. 2, pp. 14-23, 2025. doi: 10.70393/6a6574626d.323838

20. W. Ren, X. Xiao, J. Xu, H. Chen, Y. Zhang, and J. Zhang, "Trojan virus detection and classification based on graph convolutional neural network algorithm," Journal of Industrial Engineering and Applied Science, vol. 3, no. 2, pp. 1-5, 2025. doi: 10.70393/6a69656173.323735

21. T. K. Trinh, and Z. Wang, "Dynamic graph neural networks for multi-level financial fraud detection: A temporal-structural approach," Annals of Applied Sciences, vol. 5, no. 1, 2024.

22. S. Ji, Y. Liang, X. Xiao, J. Li, and Q. Tian, "An attitude-adaptation negotiation strategy in electronic market environments," In Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), July, 2007, pp. 125-130. doi: 10.1109/snpd.2007.26

23. X. Xiao, Y. Zhang, J. Xu, W. Ren, and J. Zhang, "Assessment methods and protection strategies for data leakage risks in large language models," Journal of Industrial Engineering and Applied Science, vol. 3, no. 2, pp. 6-15, 2025. doi: 10.70393/6a69656173.323736

24. T. K. Trinh, and D. Zhang, "Algorithmic fairness in financial decision-making: Detection and mitigation of bias in credit scoring applications," Journal of Advanced Computing Systems, vol. 4, no. 2, pp. 36-49, 2024. doi: 10.69987/jacs.2024.40204

25. X. Zhang, "Challenges and future directions in the institutionalization of private equity fund management in China," Economics and Management Innovation, vol. 2, no. 5, pp. 8–14, 2025.

26. X. Liu, Z. Chen, K. Hua, M. Liu, and J. Zhang, "An adaptive multimedia signal transmission strategy in cloud-assisted vehicular networks," In 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud), August, 2017, pp. 220-226. doi: 10.1109/ficloud.2017.42

27. H. McNichols, M. Zhang, and A. Lan, "Algebra error classification with large language models," In International Conference on Artificial Intelligence in Education, June, 2023, pp. 365-376. doi: 10.1007/978-3-031-36272-9_30

28. Q. Li and J. Yao, "The deteriorating US-China relations’ impact on China’s economic crisis in 2024," Methodology, vol. 6, no. 11, pp. 33–43, 2024.

29. M. Zhang, N. Heffernan, and A. Lan, "Modeling and analyzing scorer preferences in short-answer math questions," arXiv preprint arXiv:2306.00791, 2023.

30. M. Zhang, S. Baral, N. Heffernan, and A. Lan, "Automatic short math answer grading via in-context meta-learning," arXiv preprint arXiv:2205.15219, 2022.

31. M. Zhang, T. Mathew, and B. Juba, "An improved algorithm for learning to perform exception-tolerant abduction," In Proceedings of the AAAI Conference on Artificial Intelligence (Vol. 31, No. 1)., February, 2017. doi: 10.1609/aaai.v31i1.10700

32. L. Yun, "Analyzing credit risk management in the digital age: Challenges and solutions," Economics and Management Innovation, vol. 2, no. 2, pp. 81–92, 2025, doi: 10.71222/ps8sw070.

33. S. Zhang, Z. Feng, and B. Dong, "LAMDA: Low-latency anomaly detection architecture for real-time cross-market financial decision support," Academia Nexus Journal, vol. 3, no. 2, 2024.

34. Z. Wang, X. Wang, and H. Wang, "Temporal graph neural networks for money laundering detection in cross-border transactions," Academia Nexus Journal, vol. 3, no. 2, 2024.