Federated Learning-Based Framework for Privacy-Protected Cross-Border Financial Risk Evaluation: Analyzing US-Asia Investment Flows
Main Article Content
Abstract
This paper presents a novel federated learning framework for privacy-preserving cross-border financial risk assessment, specifically focused on US-Asia investment flows. Cross-border financial transactions face significant challenges in risk assessment due to disparate regulatory environments, data sovereignty requirements, and privacy constraints across jurisdictions. Our proposed architecture addresses these challenges through a multi-layered approach that incorporates differential privacy, homomorphic encryption, and secure aggregation techniques while enabling collaborative model training without raw data exchange. Experimental results demonstrate that the proposed framework achieves 94.5% detection accuracy with 217ms latency in real-world case studies, outperforming conventional federated learning approaches by 4.3-7.2% across key performance metrics while maintaining regulatory compliance. The architecture reduces false positives by 73% compared to baseline methods while preserving data locality requirements. Privacy protection analysis confirms resilience against multiple attack vectors with only 0.4% model inversion success rate compared to 7.2% for state-of-the-art alternatives. This research establishes a foundation for enhanced cross-jurisdictional financial risk assessment that balances analytical capabilities with strict privacy preservation, enabling financial institutions to develop more sophisticated risk models across US and Asian markets without compromising regulatory compliance or data sovereignty.
Article Details
Section
How to Cite
References
1. J. Fan, T. K. Trinh, and H. Zhang, "Deep learning-based transfer pricing anomaly detection and risk alert system for pharmaceutical companies: A data security-oriented approach," Journal of Advanced Computing Systems, vol. 4, no. 2, pp. 1-14, 2024.
2. W. Bi, T. K. Trinh, and S. Fan, "Machine learning-based pattern recognition for anti-money laundering in banking systems," Journal of Advanced Computing Systems, vol. 4, no. 11, pp. 30-41, 2024. doi: 10.69987/jacs.2024.41103
3. S. Zhang, Z. Feng, and B. Dong, "LAMDA: Low-latency anomaly detection architecture for real-time cross-market financial decision support," Academia Nexus Journal, vol. 3, no. 2, 2024.
4. Z. Wang, X. Wang, and H. Wang, "Temporal graph neural networks for money laundering detection in cross-border transactions," Academia Nexus Journal, vol. 3, no. 2, 2024.
5. A. Kang, J. Xin, and X. Ma, "Anomalous cross-border capital flow patterns and their implications for national economic security: An empirical analysis," Journal of Advanced Computing Systems, vol. 4, no. 5, pp. 42-54, 2024. doi: 10.69987/jacs.2024.40504
6. J. Liang, C. Zhu, and Q. Zheng, "Developing evaluation metrics for cross-lingual LLM-based detection of subtle sentiment manipulation in online financial content," Journal of Advanced Computing Systems, vol. 3, no. 9, pp. 24-38, 2023. doi: 10.69987/jacs.2023.30903
7. Z. Wang, and J. Liang, "Comparative analysis of interpretability techniques for feature importance in credit risk assessment," Spectrum of Research, vol. 4, no. 2, 2024.
8. B. Dong, and Z. Zhang, "AI-driven framework for compliance risk assessment in cross-border payments: Multi-jurisdictional challenges and response strategies," Spectrum of Research, vol. 4, no. 2, 2024.
9. J. Wang, L. Guo, and K. Qian, "LSTM-based heart rate dynamics prediction during aerobic exercise for elderly adults," 2025. doi: 10.20944/preprints202504.1692.v1
10. D. Ma, M. Shu, and H. Zhang, "Feature selection optimization for employee retention prediction: A machine learning approach for human resource management," 2025. doi: 10.20944/preprints202504.1549.v1
11. M. Li, D. Ma, and Y. Zhang, "Improving database anomaly detection efficiency through sample difficulty estimation," 2025. doi: 10.20944/preprints202504.1527.v1
12. K. Yu, Y. Chen, T. K. Trinh, and W. Bi, "Real-time detection of anomalous trading patterns in financial markets using generative adversarial networks," 2025. doi: 10.54254/2755-2721/2025.22016
13. C. Ju, and T. K. Trinh, "A machine learning approach to supply chain vulnerability early warning system: Evidence from US semiconductor industry," Journal of Advanced Computing Systems, vol. 3, no. 11, pp. 21-35, 2023.
14. G. Rao, T. K. Trinh, Y. Chen, M. Shu, and S. Zheng, "Jump prediction in systemically important financial institutions' CDS prices," Spectrum of Research, vol. 4, no. 2, 2024.
15. X. Xiao, H. Chen, Y. Zhang, W. Ren, J. Xu, and J. Zhang, "Anomalous payment behavior detection and risk prediction for SMEs based on LSTM-attention mechanism," Academic Journal of Sociology and Management, vol. 3, no. 2, pp. 43-51, 2025. doi: 10.70393/616a736d.323733
16. X. Xiao, Y. Zhang, H. Chen, W. Ren, J. Zhang, and J. Xu, "A differential privacy-based mechanism for preventing data leakage in large language model training," Academic Journal of Sociology and Management, vol. 3, no. 2, pp. 33-42, 2025. doi: 10.70393/616a736d.323732
17. J. Zhang, X. Xiao, W. Ren, and Y. Zhang, "Privacy-preserving feature extraction for medical images based on fully homomorphic encryption," Journal of Advanced Computing Systems, vol. 4, no. 2, pp. 15-28, 2024.
18. X. Hu and R. Caldentey, "Trust and reciprocity in firms’ capacity sharing," Manufacturing & Service Operations Management, vol. 25, no. 4, pp. 1436–1450, 2023, doi: 10.1287/msom.2023.1203.
19. B. Dong, and T. K. Trinh, "Real-time early warning of trading behavior anomalies in financial markets: An AI-driven approach," Journal of Economic Theory and Business Management, vol. 2, no. 2, pp. 14-23, 2025. doi: 10.70393/6a6574626d.323838
20. W. Ren, X. Xiao, J. Xu, H. Chen, Y. Zhang, and J. Zhang, "Trojan virus detection and classification based on graph convolutional neural network algorithm," Journal of Industrial Engineering and Applied Science, vol. 3, no. 2, pp. 1-5, 2025. doi: 10.70393/6a69656173.323735
21. T. K. Trinh, and Z. Wang, "Dynamic graph neural networks for multi-level financial fraud detection: A temporal-structural approach," Annals of Applied Sciences, vol. 5, no. 1, 2024.
22. S. Ji, Y. Liang, X. Xiao, J. Li, and Q. Tian, "An attitude-adaptation negotiation strategy in electronic market environments," In Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), July, 2007, pp. 125-130. doi: 10.1109/snpd.2007.26
23. X. Xiao, Y. Zhang, J. Xu, W. Ren, and J. Zhang, "Assessment methods and protection strategies for data leakage risks in large language models," Journal of Industrial Engineering and Applied Science, vol. 3, no. 2, pp. 6-15, 2025. doi: 10.70393/6a69656173.323736
24. T. K. Trinh, and D. Zhang, "Algorithmic fairness in financial decision-making: Detection and mitigation of bias in credit scoring applications," Journal of Advanced Computing Systems, vol. 4, no. 2, pp. 36-49, 2024. doi: 10.69987/jacs.2024.40204
25. X. Zhang, "Challenges and future directions in the institutionalization of private equity fund management in China," Economics and Management Innovation, vol. 2, no. 5, pp. 8–14, 2025.
26. X. Liu, Z. Chen, K. Hua, M. Liu, and J. Zhang, "An adaptive multimedia signal transmission strategy in cloud-assisted vehicular networks," In 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud), August, 2017, pp. 220-226. doi: 10.1109/ficloud.2017.42
27. H. McNichols, M. Zhang, and A. Lan, "Algebra error classification with large language models," In International Conference on Artificial Intelligence in Education, June, 2023, pp. 365-376. doi: 10.1007/978-3-031-36272-9_30
28. Q. Li and J. Yao, "The deteriorating US-China relations’ impact on China’s economic crisis in 2024," Methodology, vol. 6, no. 11, pp. 33–43, 2024.
29. M. Zhang, N. Heffernan, and A. Lan, "Modeling and analyzing scorer preferences in short-answer math questions," arXiv preprint arXiv:2306.00791, 2023.
30. M. Zhang, S. Baral, N. Heffernan, and A. Lan, "Automatic short math answer grading via in-context meta-learning," arXiv preprint arXiv:2205.15219, 2022.
31. M. Zhang, T. Mathew, and B. Juba, "An improved algorithm for learning to perform exception-tolerant abduction," In Proceedings of the AAAI Conference on Artificial Intelligence (Vol. 31, No. 1)., February, 2017. doi: 10.1609/aaai.v31i1.10700
32. L. Yun, "Analyzing credit risk management in the digital age: Challenges and solutions," Economics and Management Innovation, vol. 2, no. 2, pp. 81–92, 2025, doi: 10.71222/ps8sw070.
33. S. Zhang, Z. Feng, and B. Dong, "LAMDA: Low-latency anomaly detection architecture for real-time cross-market financial decision support," Academia Nexus Journal, vol. 3, no. 2, 2024.
34. Z. Wang, X. Wang, and H. Wang, "Temporal graph neural networks for money laundering detection in cross-border transactions," Academia Nexus Journal, vol. 3, no. 2, 2024.