Analyzing Foreign Investment Patterns in the U.S. Semiconductor Value Chain Using AI-Enabled Analytics: A Framework for Economic Security
Keywords:
semiconductor value chain, foreign investment analysis, AI-enabled analytics, economic security frameworkAbstract
This paper introduces an AI-enabled analytical framework for assessing foreign investment patterns within the US semiconductor value chain to address emerging economic security challenges. The semiconductor industry constitutes a critical technological foundation for economic and military capabilities, with investment patterns revealing strategic targeting of key value chain segments. The methodology incorporates multi-source data integration from regulatory filings, corporate registries, and technical documentation to establish a comprehensive investment database. Machine learning algorithms including graph neural networks (95.6% detection accuracy) and deep neural networks (94.8% accuracy) enable identification of coordinated investment strategies and ultimate beneficial ownership structures that remain below current regulatory screening thresholds. Analysis reveals significant temporal-spatial shifts in investment targeting with pronounced concentration in electronic design automation (875% increase 2010-2023) and specialized materials segments (17.2% annual growth 2020-2023). Entity-level analysis identifies 47 high-risk investors employing sophisticated investment strategies targeting critical supply chain nodes. The research demonstrates substantial concentration in 12 technology sub-segments where foreign investment exceeds 65% of total investment volume. Proposed policy frameworks include AI-enhanced CFIUS screening methodologies, calibrated risk-based intervention approaches, and international coordination mechanisms supporting semiconductor supply chain resilience while maintaining innovation ecosystems. This framework provides policymakers with data-driven capabilities for precision-targeted intervention minimizing economic disruption while addressing legitimate national security considerations.
References
1. M. N. Varadarajan and S. Priya, "AI and ML in Finance: Revolutionizing the Future of Banking and Investments," in 2024 6th Int. Conf. Energy, Power and Environment (ICEPE), Shillong, India, pp. 1–5, 2024, doi: 10.1109/ICEPE63236.2024.10668910.
2. R. Raman and P. Tiwari, "Finance’s AI Revolution: Transforming Banking and Investments for Tomorrow," in 2024 Int. Conf. Emerging Systems and Intelligent Computing (ESIC), Bhubaneswar, India, pp. 478–483, 2024, doi: 10.1109/ESIC60604.2024.10481645.
3. V. G. Murugan, K. Kaur, S. Pundir, R. Singh, P. Kumar Patjoshi, and L. N. Jayanthi, "Predictive Model for Risk Assessment in Share Market Using AI in Finance," in 2024 Int. Conf. Distributed Computing and Optimization Techniques (ICDCOT), Bengaluru, India, pp. 1–5, 2024, doi: 10.1109/ICDCOT61034.2024.10515683.
4. A. Bhardwaj, O. Ranjan, S. Biswas, L. Gupta, Y. Chanti, and M. Sharma, "Risk Assessment and Management in Stock Trading using Artificial Intelligence," in 2024 3rd Int. Conf. Sentiment Analysis and Deep Learning (ICSADL), Bhimdatta, Nepal, pp. 138–145, 2024, doi: 10.1109/ICSADL61749.2024.00029.
5. Z. Zhou, Y. Xi, S. Xing, and Y. Chen, "Cultural Bias Mitigation in Vision-Language Models for Digital Heritage Documenta-tion: A Comparative Analysis of Debiasing Techniques," Artif. Intell. Mach. Learn. Rev., vol. 5, no. 3, pp. 28–40, 2024, doi: 10.69987/AIMLR.2024.50303.
6. Z. Wu, E. Feng, and Z. Zhang, "Temporal-Contextual Behavioral Analytics for Proactive Cloud Security Threat Detection," Acad. Nexus J., vol. 3, no. 2, 2024.
7. Z. Ji, C. Hu, X. Jia, and Y. Chen, "Research on Dynamic Optimization Strategy for Cross-platform Video Transmission Quality Based on Deep Learning," Artif. Intell. Mach. Learn. Rev., vol. 5, no. 4, pp. 69–82, 2024, doi: 10.69987/AIMLR.2024.50406.
8. K. Zhang, S. Xing, and Y. Chen, "Research on Cross-Platform Digital Advertising User Behavior Analysis Framework Based on Federated Learning," Artif. Intell. Mach. Learn. Rev., vol. 5, no. 3, pp. 41–54, 2024, doi: 10.69987/AIMLR.2024.50304.
9. Y. Liu, E. Feng, and S. Xing, "Dark Pool Information Leakage Detection through Natural Language Processing of Trader Communications," J. Adv. Comput. Syst., vol. 4, no. 11, pp. 42–55, 2024, doi: 10.69987/JACS.2024.41104.
10. Y. Chen, Y. Zhang, and X. Jia, "Efficient Visual Content Analysis for Social Media Advertising Performance Assessment," Spectrum Res., vol. 4, no. 2, 2024.
11. Y. Zhang, G. Jia, and J. Fan, "Transformer-Based Anomaly Detection in High-Frequency Trading Data: A Time-Sensitive Fea-ture Extraction Approach," Ann. Appl. Sci., vol. 5, no. 1, 2024.
12. Y. Liu, E. Feng, and S. Xing, "Dark Pool Information Leakage Detection through Natural Language Processing of Trader Communications," J. Adv. Comput. Syst., vol. 4, no. 11, pp. 42–55, 2024, doi: 10.69987/JACS.2024.41104.
13. C. Ju and T. K. Trinh, "A Machine Learning Approach to Supply Chain Vulnerability Early Warning System: Evidence from U.S. Semiconductor Industry," J. Adv. Comput. Syst., vol. 3, no. 11, pp. 21–35, 2023, doi: 10.69987/JACS.2023.31103.
14. G. Rao, T. K. Trinh, Y. Chen, M. Shu, and S. Zheng, "Jump Prediction in Systemically Important Financial Institutions' CDS Prices," Spectrum Res., vol. 4, no. 2, 2024.
15. P. Costa, J. Ferdiansyah, and H. D. Ariessanti, "Integrating Artificial Intelligence for Autonomous Navigation in Robotics," Int. Trans. Artif. Intell., vol. 3, no. 1, pp. 64–75, 2024, doi: 10.33050/italic.v3i1.657.
16. X. Ma, W. Bi, M. Li, et al., "An Enhanced LSTM-based Sales Forecasting Model for Functional Beverages in Cross-Cultural Markets," Appl. Comput. Eng., vol. 118, pp. 55–63, 2025, doi: 10.54254/2755-2721/2025.20809.
17. E. El Mandouh and A. G. Wassal, "Application of Machine Learning Techniques in Post-Silicon Debugging and Bug Localiza-tion," J. Electron. Test, vol. 34, pp. 163–181, 2018, doi: 10.1007/s10836-018-5716-y.
18. Y. Zhang, H. Zhang, and E. Feng, "Cost-Effective Data Lifecycle Management Strategies for Big Data in Hybrid Cloud Envi-ronments," Acad. Nexus J., vol. 3, no. 2, 2024.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Chengru Ju, Guoli Rao (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.