posted by system || 729 views

SI FLCFD 2024 : SPECIAL ISSUE on Federated Learning for Collaborative Fraud Detection in Large-Scale Networks

FacebookTwitterLinkedInGoogle

Link: https://www.degruyter.com/journal/key/comp/html
 
When N/A
Where N/A
Submission Deadline Aug 10, 2024
 

Call For Papers

๐—ฆ๐—ฃ๐—˜๐—–๐—œ๐—”๐—Ÿ ๐—œ๐—ฆ๐—ฆ๐—จ๐—˜ ๐—ผ๐—ป ๐—™๐—ฒ๐—ฑ๐—ฒ๐—ฟ๐—ฎ๐˜๐—ฒ๐—ฑ ๐—Ÿ๐—ฒ๐—ฎ๐—ฟ๐—ป๐—ถ๐—ป๐—ด ๐—ณ๐—ผ๐—ฟ ๐—–๐—ผ๐—น๐—น๐—ฎ๐—ฏ๐—ผ๐—ฟ๐—ฎ๐˜๐—ถ๐˜ƒ๐—ฒ ๐—™๐—ฟ๐—ฎ๐˜‚๐—ฑ ๐——๐—ฒ๐˜๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—ถ๐—ป ๐—Ÿ๐—ฎ๐—ฟ๐—ด๐—ฒ-๐—ฆ๐—ฐ๐—ฎ๐—น๐—ฒ ๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ๐˜€

This special issue in ๐—ข๐—ฝ๐—ฒ๐—ป ๐—–๐—ผ๐—บ๐—ฝ๐˜‚๐˜๐—ฒ๐—ฟ ๐—ฆ๐—ฐ๐—ถ๐—ฒ๐—ป๐—ฐ๐—ฒ (๐—œ๐—™ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฎ: ๐Ÿญ.๐Ÿฑ) focuses on Federated learning provides a solution for enabling collaborative model training across distributed nodes without sharing sensitive data. It addresses the privacy concerns associated with centralized approaches by allowing models to be trained regionally on individual nodes without exchanging raw data. This decentralized method uses the network's collective intelligence to detect fraud while protecting the privacy of user data. Federated learning is also appropriate for dynamic fraud detection scenarios because it allows for real-time model modifications. Federated learning involves the cooperative training of a global model on a number of decentralized nodes, like servers or devices, that individually store local data samples. First, a global model is delivered to every node and initialized. Next, using its own data, each node trains the model locally, protecting privacy by using some methods. After that, the modified model parameters are combined to create a global model, which is eventually iteratively improved over several training cycles.
Some of the techniques generally utilized in federated learning for fraud detection such as differential privacy, secure aggregation, model compression, and transfer learning. Frameworks for federated learning algorithms are provided by tools like TensorFlow Federated, PySyft, and FLAML, which also guarantee data privacy and confidentiality. The adoption of advanced encryption techniques to secure model aggregation, the enhancement of federated learning frameworks optimized for resource-constrained devices, and the incorporation of domain-specific knowledge through transfer learning are the recent trends in federated learning. Enhancing scalability to support even larger networks, improving defense against adversarial attacks, and investigating federated learning applications in developing fields like edge computing and the Internet of Things are key to the future of federated learning in fraud detection.
Despite its potential, it presents several drawbacks such as heterogeneity of data distributions across nodes, ensuring model fairness, and addressing privacy concerns in highly regulated industries like finance and healthcare. The massive volumes of data involved and the requirement for a real-time response to new threats make fraud detection in large-scale networks a considerable issue. To overcome these challenges, need to use some techniques including model personalization, adaptive aggregation strategies, and federated learning-specific optimization algorithms. However, federated learning provides a privacy-preserving and scalable approach to collaborative fraud detection in large-scale networks and addresses the dynamic nature of fraudulent activities in real-time.

List of Interested topics include, but are not limited to, the following:
โ€ข Analysis of collaborative model training in federated learning.
โ€ข Applications of secure aggregation techniques in federated learning to safeguard data privacy in distributed environments.
โ€ข Advancements in federated learning for fraud detection.
โ€ข Enhancing fraud detection in resource-constrained environments with federated learning algorithms.
โ€ข Frameworks and tools for integrating federated learning algorithms in fraud detection.
โ€ข Optimization of federated learning frameworks for resource-constrained devices.
โ€ข Implementing domain-specific knowledge through transfer learning in federated fraud detection.
โ€ข Role of federated learning in fraud detection for IoT devices.
โ€ข Utilization of transfer learning approaches for leveraging domain-specific knowledge.
โ€ข Strategies to overcome challenges in federated learning for fraud detection.

Authors are requested to submit their full revised papers complying with the general scope of the journal. The submitted papers will undergo the standard peer-review process before they can be accepted. Notification of acceptance will be communicated as we progress with the review process.

===
๐‘ฎ๐‘ผ๐‘ฌ๐‘บ๐‘ป ๐‘ฌ๐‘ซ๐‘ฐ๐‘ป๐‘ถ๐‘น๐‘บ

Mahmud Iwan Solihin, UCSI University, Malaysia.
Lin Guoping, Tunghai University, Taiwan.
Slamet Riyadi, Universitas Muhammadiyah Yogyakarta, Indonesia.

๐˜ผ๐˜ฟ๐™‘๐™„๐™Ž๐™Š๐™๐™” ๐™€๐˜ฟ๐™„๐™๐™Š๐™
Christos Anagnostopoulos, University of Glasgow, United Kingdom

===
๐‘ซ๐‘ฌ๐‘จ๐‘ซ๐‘ณ๐‘ฐ๐‘ต๐‘ฌ

The deadline for submissions is ๐—”๐—จ๐—š๐—จ๐—ฆ๐—ง ๐Ÿญ๐Ÿฌ, ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฐ, but individual papers will be reviewed and published online on an ongoing basis.

===
๐‘ฏ๐‘ถ๐‘พ ๐‘ป๐‘ถ ๐‘บ๐‘ผ๐‘ฉ๐‘ด๐‘ฐ๐‘ป
All submissions to the Special Issue must be made electronically via the online submission system Editorial Manager:

๐—ต๐˜๐˜๐—ฝ๐˜€://๐˜„๐˜„๐˜„.๐—ฒ๐—ฑ๐—ถ๐˜๐—ผ๐—ฟ๐—ถ๐—ฎ๐—น๐—บ๐—ฎ๐—ป๐—ฎ๐—ด๐—ฒ๐—ฟ.๐—ฐ๐—ผ๐—บ/๐—ผ๐—ฝ๐—ฒ๐—ป๐—ฐ๐˜€/๐—ฑ๐—ฒ๐—ณ๐—ฎ๐˜‚๐—น๐˜๐Ÿฎ.๐—ฎ๐˜€๐—ฝ๐˜…

Please choose the article type โ€œ๐™Ž๐™„: ๐™๐™š๐™™๐™š๐™ง๐™–๐™ฉ๐™š๐™™ ๐™‡๐™š๐™–๐™ง๐™ฃ๐™ž๐™ฃ๐™œ ๐™›๐™ค๐™ง ๐˜พ๐™ค๐™ก๐™ก๐™–๐™—๐™ค๐™ง๐™–๐™ฉ๐™ž๐™ซ๐™š ๐™๐™ง๐™–๐™ช๐™™ ๐˜ฟ๐™š๐™ฉ๐™š๐™˜๐™ฉ๐™ž๐™ค๐™ฃโ€.

===
๐‘ช๐‘ถ๐‘ต๐‘ป๐‘จ๐‘ช๐‘ป

๐—ผ๐—ฝ๐—ฒ๐—ป๐—ฐ๐—ผ๐—บ๐—ฝ๐˜‚๐˜๐—ฒ๐—ฟ๐˜€๐—ฐ๐—ถ๐—ฒ๐—ป๐—ฐ๐—ฒ@๐—ฑ๐—ฒ๐—ด๐—ฟ๐˜‚๐˜†๐˜๐—ฒ๐—ฟ.๐—ฐ๐—ผ๐—บ

===
๐—™๐—ผ๐—ฟ ๐—บ๐—ผ๐—ฟ๐—ฒ ๐—ถ๐—ป๐—ณ๐—ผ๐—ฟ๐—บ๐—ฎ๐˜๐—ถ๐—ผ๐—ป, ๐—ฝ๐—น๐—ฒ๐—ฎ๐˜€๐—ฒ ๐˜ƒ๐—ถ๐˜€๐—ถ๐˜ ๐—ผ๐˜‚๐—ฟ ๐˜„๐—ฒ๐—ฏ๐˜€๐—ถ๐˜๐—ฒ.

https://www.degruyter.com/journal/key/comp/html#overview

Related Resources

SI - AI&Cyber - Applied Sciences (MDPI) 2025   Special Issue on Artificial Intelligence and Cybersecurity: Challenges and Opportunities
SI:ML-Privacy - Applied Sciences (MDPI) 2025   Privacy-Preserving and System Security Control Based on Machine Learning
ICSTTE 2025   2025 3rd International Conference on SmartRail, Traffic and Transportation Engineering (ICSTTE 2025)
FL-AsiaCCS 2025   International Workshop on Secure and Efficient Federated Learning In Conjunction with ACM AsiaCCS 2025
FLUID@AAAI 2025   The 1st Workshop on Federated Learning for Unbounded and Intelligent Decentralization (FLUID)
Ei/Scopus-CCISS 2025   2025 2nd International Conference on Computing, Information Science and System (CCISS 2025)
CVAI 2026   2026 International Symposium on Computer Vision and Artificial Intelligence (CVAI 2026)
TSD 2025   Twenty-eighth International Conference on Text, Speech and Dialogue
ICIMP 2025   The Twentieth International Conference on Internet Monitoring and Protection
Ei/Scopus-CVCM 2025   2025 6th International Conference on Computer Vision, Communications and Multimedia๏ผˆCVCM 2025๏ผ‰