Edge-Deployed AI for Intelligent Financial Document Processing and Fraud Detection: A Technical Review
DOI:
https://doi.org/10.22399/ijcesen.4751Keywords:
Edge Artificial Intelligence, Financial Document Processing, Fraud Detection Systems, Federated Learning, Privacy-Preserving ComputationAbstract
The proliferation of mobile banking and financial service applications has revolutionized document processing workflows with remote capture and validation capabilities. Traditional server-based systems for processing financial documents including checks, mortgage instruments, trust agreements, and tax compliance forms capture images and forward them to centralized computing infrastructure for optical character recognition and validation workflows, which expose weaknesses in terms of latency, privacy risks, and operational expenses. Contemporary edge computing paradigms allow artificial intelligence models to run directly on mobile devices, freeing up backend servers and processing sensitive financial documents in local settings. Resource-efficient anchor-free object detection networks designed for use in constrained environments enable real-time extraction of critical document components essential for validation and authentication workflows across diverse financial instrument types. Architectures deployed at the edge exhibit substantial benefits in the form of lower transaction latency, better privacy safeguarding with localized processing, lower infrastructure expenses, and increased reliability under connectivity-limited circumstances. Federated learning mechanisms facilitate ongoing model improvement without centralized sensitive data, maintaining user privacy while enhancing detection capabilities. Persistent challenges include model drift due to changing document designs, adversarial attack susceptibility, device security needs, and governance complexity for distributed deployment. Hardware-software co-design efforts hold out the promise of specialized neural processing units with custom operations supporting document intelligence tasks, allowing for more advanced capabilities within mobile form factors and power budgets.
References
1. Google Patent, "US20230061605A1 - Systems and methods for intelligent fraud detection," 2023. [Online]. Available: https://patentimages.storage.googleapis.com/82/dc/5e/47b97e454add75/US20230061605A1.pdf
2. Liu Liu and Zhifei Xu, "Optimizing lightweight neural networks for efficient mobile edge computing," Scientific Reports, 2025. [Online]. Available: https://www.nature.com/articles/s41598-025-04652-7.pdf
3. Xurui Li, et al., "Hierarchical Multi-task Learning for Enterprise Risk Detection from Financial Documents," IEEE Xplore, 2022. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/10020311
4. Kimaya Kotgire, "Real-Time Fraud Detection with AI: How It Works and Why It Matters," Nitor Infotech, 2025. [Online]. Available: https://www.nitorinfotech.com/blog/real-time-fraud-detection-with-ai-how-it-works-and-why-it-matters/
5. Gaudenz Boesch, "An Introduction to Federated Learning," Viso.ai, 2023. [Online]. Available: https://viso.ai/deep-learning/federated-learning/
6. Anike Arni, "Building a privacy-preserving architecture with less server trust," Thoughtworks, 2017. [Online]. Available: https://www.thoughtworks.com/en-in/insights/blog/building-privacy-preserving-architecture-less-server-trust
7. Joseph Redmon, Ali Farhadi, "YOLOv3: An Incremental Improvement," arXiv, 2018. [Online]. Available: https://arxiv.org/abs/1804.02767
8. Zheng Ge, et al., "YOLOX: Exceeding YOLO Series in 2021," arXiv, 2021. [Online]. Available: https://arxiv.org/abs/2107.08430
9. H. Brendan McMahan, et al., "Communication-Efficient Learning of Deep Networks from Decentralized Data," arXiv, 2016. [Online]. Available: https://arxiv.org/abs/1602.05629
10. Mark Sandler, et al., "MobileNetV2: Inverted Residuals and Linear Bottlenecks," arXiv, 2018. [Online]. Available:https://arxiv.org/abs/1801.04381
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.