Privacy-Utility Tradeoffs in Federated Financial Analytics: An Optimization Framework
Main Article Content
Abstract
Article Details
Issue
Section
How to Cite
References
1. T. Li, A. K. Sahu, A. Talwalkar, and V. Smith, "Federated learning: Challenges, methods, and future directions," IEEE signal processing magazine, vol. 37, no. 3, pp. 50-60, 2020. doi: 10.1109/msp.2020.2975749
2. G. Long, Y. Tan, J. Jiang, and C. Zhang, "Federated learning for open banking," In Federated learning: privacy and incentive, 2020, pp. 240-254. doi: 10.1007/978-3-030-63076-8_17
3. N. Kumar, M. Rathee, N. Chandran, D. Gupta, A. Rastogi, and R. Sharma, "Cryptflow: Secure tensorflow inference," In 2020 IEEE Symposium on Security and Privacy (SP), May, 2020, pp. 336-353. doi: 10.1109/sp40000.2020.00092
4. K. Wei, J. Li, M. Ding, C. Ma, H. H. Yang, F. Farokhi, and H. V. Poor, "Federated learning with differential privacy: Algorithms and performance analysis," IEEE transactions on information forensics and security, vol. 15, pp. 3454-3469, 2020.
5. T. Awosika, R. M. Shukla, and B. Pranggono, "Transparency and privacy: the role of explainable ai and federated learning in financial fraud detection," IEEE access, vol. 12, pp. 64551-64560, 2024. doi: 10.1109/access.2024.3394528
6. K. Wei, J. Li, C. Ma, M. Ding, W. Chen, J. Wu, and H. V. Poor, "Personalized federated learning with differential privacy and convergence guarantee," IEEE Transactions on Information Forensics and Security, vol. 18, pp. 4488-4503, 2023. doi: 10.1109/tifs.2023.3293417
7. D. Pessach, and E. Shmueli, "A review on fairness in machine learning," ACM Computing Surveys (CSUR), vol. 55, no. 3, pp. 1-44, 2022. doi: 10.1145/3494672
8. Z. Dong and R. Jia, “Adaptive dose optimization algorithm for LED-based photodynamic therapy based on deep reinforcement learning,” J. Sustain., Policy, Pract., vol. 1, no. 3, pp. 144–155, 2025.
9. D. Byrd, and A. Polychroniadou, "Differentially private secure multi-party computation for federated learning in financial applications," In Proceedings of the first ACM international conference on AI in finance, October, 2020, pp. 1-9. doi: 10.1145/3383455.3422562
10. G. Andrew, O. Thakkar, B. McMahan, and S. Ramaswamy, "Differentially private learning with adaptive clipping," Advances in Neural Information Processing Systems, vol. 34, pp. 17455-17466, 2021.
11. M. Keller, "MP-SPDZ: A versatile framework for multi-party computation," In Proceedings of the 2020 ACM SIGSAC conference on computer and communications security, October, 2020, pp. 1575-1590. doi: 10.1145/3372297.3417872
12. V. Costan, and S. Devadas, "Intel SGX explained," Cryptology ePrint Archive, 2016.
13. S. Sav, A. Pyrgelis, J. R. Troncoso-Pastoriza, D. Froelicher, J. P. Bossuat, J. S. Sousa, and J. P. Hubaux, "POSEIDON: Privacy-preserving federated neural network learning," arXiv preprint arXiv:2009.00349, 2020.
14. M. Abadi, A. Chu, I. Goodfellow, H. B. McMahan, I. Mironov, K. Talwar, and L. Zhang, "Deep learning with differential privacy," In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, October, 2016, pp. 308-318. doi: 10.1145/2976749.2978318
15. Z. Song, Y. Zhang, and I. King, "Towards fair financial services for all: A temporal GNN approach for individual fairness on transaction networks," In Proceedings of the 32nd ACM international conference on information and knowledge management, October, 2023, pp. 2331-2341. doi: 10.1145/3583780.3615091.