Deep reinforcement learning for blockchain in industrial IoT: A survey

[1]  M. Shamim Hossain,et al.  A Secure Data Aggregation Strategy in Edge Computing and Blockchain empowered Internet of Things , 2020 .

[2]  Geyong Min,et al.  A Graph Neural Network-Based Digital Twin for Network Slicing Management , 2022, IEEE Transactions on Industrial Informatics.

[3]  Klaus Moessner,et al.  Radio Resource Management Approaches for Reliable Device-to-Device (D2D) Communication in Wireless Industrial Applications , 2021, IEEE Transactions on Cognitive Communications and Networking.

[4]  Xiaofei Wang,et al.  Networking Integrated Cloud–Edge–End in IoT: A Blockchain-Assisted Collective Q-Learning Approach , 2021, IEEE Internet of Things Journal.

[5]  Gihan J. Mendis,et al.  DDLPF: A Practical Decentralized Deep Learning Paradigm for Internet-of-Things Applications , 2021, IEEE Internet of Things Journal.

[6]  Yulei Wu,et al.  Robust Learning-Enabled Intelligence for the Internet of Things: A Survey From the Perspectives of Noisy Data and Adversarial Examples , 2021, IEEE Internet of Things Journal.

[7]  Benjamin Turnbull,et al.  A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks , 2021, IEEE Internet of Things Journal.

[8]  Mauro Iacono,et al.  Designing a GDPR compliant blockchain-based IoV distributed information tracking system , 2021, Inf. Process. Manag..

[9]  Jianhua Ma,et al.  Variational LSTM Enhanced Anomaly Detection for Industrial Big Data , 2021, IEEE Transactions on Industrial Informatics.

[10]  Weishan Zhang,et al.  Blockchain-Based Federated Learning for Device Failure Detection in Industrial IoT , 2021, IEEE Internet of Things Journal.

[11]  Athanasios V. Vasilakos,et al.  Designing Blockchain-Based Access Control Protocol in IoT-Enabled Smart-Grid System , 2021, IEEE Internet of Things Journal.

[12]  Yan Zhang,et al.  Consortium Blockchain for Secure Resource Sharing in Vehicular Edge Computing: A Contract-Based Approach , 2021, IEEE Transactions on Network Science and Engineering.

[13]  Laurence Tianruo Yang,et al.  A Tensor-Based Multiattributes Visual Feature Recognition Method for Industrial Intelligence , 2021, IEEE Transactions on Industrial Informatics.

[14]  Hao Wang,et al.  Convergence of Blockchain and Edge Computing for Secure and Scalable IIoT Critical Infrastructures in Industry 4.0 , 2021, IEEE Internet of Things Journal.

[15]  Shengli Xie,et al.  NOMA-Enabled Cooperative Computation Offloading for Blockchain-Empowered Internet of Things: A Learning Approach , 2021, IEEE Internet of Things Journal.

[16]  Xiaohong Huang,et al.  Communication-efficient Federated Learning and Permissioned Blockchain for Digital Twin Edge Networks , 2022 .

[17]  Laurence T. Yang,et al.  Deep Correlation Mining Based on Hierarchical Hybrid Networks for Heterogeneous Big Data Recommendations , 2021, IEEE Transactions on Computational Social Systems.

[18]  Guanghui Wen,et al.  Trusted-Region Subsequence Reduction for Designing Resilient Consensus Algorithms , 2021, IEEE Transactions on Network Science and Engineering.

[19]  Hong-Ning Dai,et al.  Deep learning for privacy preservation in autonomous moving platforms enhanced 5G heterogeneous networks , 2020, Comput. Networks.

[20]  Yulei Wu,et al.  Cloud-Edge Orchestration for the Internet of Things: Architecture and AI-Powered Data Processing , 2020, IEEE Internet of Things Journal.

[21]  Zibin Zheng,et al.  A Blockchain-Based Decentralized Federated Learning Framework with Committee Consensus , 2020, IEEE Network.

[22]  Yue Zhang,et al.  DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-Based Incentive , 2019, IEEE Transactions on Dependable and Secure Computing.

[23]  Yuefeng Du,et al.  Towards Private, Robust, and Verifiable Crowdsensing Systems via Public Blockchains , 2019, IEEE Transactions on Dependable and Secure Computing.

[24]  Hui Lin,et al.  A new data clustering strategy for enhancing mutual privacy in healthcare IoT systems , 2020, Future Gener. Comput. Syst..

[25]  Lin Guan,et al.  Real-time deep reinforcement learning based vehicle navigation , 2020, Appl. Soft Comput..

[26]  Jing Xu,et al.  Dumbo: Faster Asynchronous BFT Protocols , 2020, IACR Cryptol. ePrint Arch..

[27]  Houbing Song,et al.  A Many-Objective Optimization Model of Industrial Internet of Things Based on Private Blockchain , 2020, IEEE Network.

[28]  Moayad Aloqaily,et al.  An incentive-aware blockchain-based solution for internet of fake media things , 2020, Inf. Process. Manag..

[29]  An Liu,et al.  CPchain: A Copyright-Preserving Crowdsourcing Data Trading Framework Based on Blockchain , 2020, 2020 29th International Conference on Computer Communications and Networks (ICCCN).

[30]  F. Richard Yu,et al.  Resource Optimization for Delay-Tolerant Data in Blockchain-Enabled IoT With Edge Computing: A Deep Reinforcement Learning Approach , 2020, IEEE Internet of Things Journal.

[31]  Gautam Srivastava,et al.  Blockchain Technology and Neural Networks for the Internet of Medical Things , 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[32]  Ali Kashif Bashir,et al.  Collaborative Trust Blockchain Based Unbiased Control Transfer Mechanism for Industrial Automation , 2020, IEEE Transactions on Industry Applications.

[33]  Siya Xu,et al.  Trusted Cloud-Edge Network Resource Management: DRL-Driven Service Function Chain Orchestration for IoT , 2020, IEEE Internet of Things Journal.

[34]  Jun Li,et al.  APCN: A scalable architecture for balancing accountability and privacy in large-scale content-based networks , 2020, Inf. Sci..

[35]  Moayad Aloqaily,et al.  A Blockchain-Based Decentralized Composition Solution for IoT Services , 2020, ICC 2020 - 2020 IEEE International Conference on Communications (ICC).

[36]  Yan Zhang,et al.  Blockchain and Federated Learning for Privacy-Preserved Data Sharing in Industrial IoT , 2020, IEEE Transactions on Industrial Informatics.

[37]  Tong Li,et al.  Automatic Virtual Network Embedding: A Deep Reinforcement Learning Approach With Graph Convolutional Networks , 2020, IEEE Journal on Selected Areas in Communications.

[38]  Kevin I-Kai Wang,et al.  Deep-Learning-Enhanced Human Activity Recognition for Internet of Healthcare Things , 2020, IEEE Internet of Things Journal.

[39]  Ke Xu,et al.  Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT , 2020, IEEE Journal on Selected Areas in Communications.

[40]  Qianbin Chen,et al.  Blockchain-Enabled Software-Defined Industrial Internet of Things With Deep Reinforcement Learning , 2020, IEEE Internet of Things Journal.

[41]  Dusit Niyato,et al.  Distributed Dynamic Resource Management and Pricing in the IoT Systems With Blockchain-as-a-Service and UAV-Enabled Mobile Edge Computing , 2020, IEEE Internet of Things Journal.

[42]  Ahmed Farouk,et al.  Blockchain platform for industrial healthcare: Vision and future opportunities , 2020, Comput. Commun..

[43]  Yulei Wu,et al.  Toward Optimal Resource Scheduling for Internet of Things Under Imperfect CSI , 2020, IEEE Internet of Things Journal.

[44]  Yulei Wu,et al.  An Efficient Collaboration and Incentive Mechanism for Internet of Vehicles (IoV) With Secured Information Exchange Based on Blockchains , 2020, IEEE Internet of Things Journal.

[45]  Haipeng Yao,et al.  A Service-Oriented Permissioned Blockchain for the Internet of Things , 2020, IEEE Transactions on Services Computing.

[46]  Dongxi Liu,et al.  A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems , 2020, IEEE Transactions on Industrial Informatics.

[47]  Hanlei Wang,et al.  Differential-cascade framework for consensus of networked Lagrangian systems , 2020, Autom..

[48]  Yulei Wu,et al.  FDC: A Secure Federated Deep Learning Mechanism for Data Collaborations in the Internet of Things , 2020, IEEE Internet of Things Journal.

[49]  Yulei Wu,et al.  An Intelligent Anomaly Detection Scheme for Micro-Services Architectures With Temporal and Spatial Data Analysis , 2020, IEEE Transactions on Cognitive Communications and Networking.

[50]  Anit Kumar Sahu,et al.  Federated Learning: Challenges, Methods, and Future Directions , 2019, IEEE Signal Processing Magazine.

[51]  Yike Guo,et al.  GDPR-Compliant Personal Data Management: A Blockchain-Based Solution , 2019, IEEE Transactions on Information Forensics and Security.

[52]  Peng Jiang,et al.  A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..

[53]  Di Wu,et al.  When Deep Reinforcement Learning Meets Federated Learning: Intelligent Multi-Timescale Resource Management for Multi-access Edge Computing in 5G Ultra Dense Network , 2020, ArXiv.

[54]  Weidong Xiao,et al.  A Blockchain-Based Traceable IP Copyright Protection Algorithm , 2020, IEEE Access.

[55]  Wei-Chiang Hong,et al.  Machine Learning Adoption in Blockchain-Based Smart Applications: The Challenges, and a Way Forward , 2020, IEEE Access.

[56]  Yulei Wu,et al.  A New Bitcoin Address Association Method Using a Two-Level Learner Model , 2019, ICA3PP.

[57]  Soo Young Shin,et al.  BUAV: A blockchain based secure UAV-assisted data acquisition scheme in Internet of Things , 2019, Journal of Communications and Networks.

[58]  Miaowen Wen,et al.  MBID: Micro-Blockchain-Based Geographical Dynamic Intrusion Detection for V2X , 2019, IEEE Communications Magazine.

[59]  Jinjun Chen,et al.  Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions , 2019, Future Gener. Comput. Syst..

[60]  Sukumar Nandi,et al.  Managing Smart Home Appliances with Proof of Authority and Blockchain , 2019, I4CS.

[61]  Ning Zhang,et al.  A Secure Charging Scheme for Electric Vehicles With Smart Communities in Energy Blockchain , 2019, IEEE Internet of Things Journal.

[62]  Jie Xu,et al.  Data-driven dynamic resource scheduling for network slicing: A Deep reinforcement learning approach , 2019, Inf. Sci..

[63]  Rajesh Kumar,et al.  A Hybrid Technique To Detect Botnets, Based on P2P Traffic Similarity , 2019, 2019 Cybersecurity and Cyberforensics Conference (CCC).

[64]  Mehmet A. Orgun,et al.  A Proof-of-Trust Consensus Protocol for Enhancing Accountability in Crowdsourcing Services , 2019, IEEE Transactions on Services Computing.

[65]  Hong-Ning Dai,et al.  SCTSC: A Semicentralized Traffic Signal Control Mode With Attribute-Based Blockchain in IoVs , 2019, IEEE Transactions on Computational Social Systems.

[66]  A. Shahaab,et al.  Applicability and Appropriateness of Distributed Ledgers Consensus Protocols in Public and Private Sectors: A Systematic Review , 2019, IEEE Access.

[67]  Haipeng Yao,et al.  Resource Trading in Blockchain-Based Industrial Internet of Things , 2019, IEEE Transactions on Industrial Informatics.

[68]  Eul Gyu Im,et al.  A Multimodal Deep Learning Method for Android Malware Detection Using Various Features , 2019, IEEE Transactions on Information Forensics and Security.

[69]  Qiang Yang,et al.  Federated Machine Learning , 2019, ACM Trans. Intell. Syst. Technol..

[70]  F. Richard Yu,et al.  Integrated Blockchain and Edge Computing Systems: A Survey, Some Research Issues and Challenges , 2019, IEEE Communications Surveys & Tutorials.

[71]  Geyong Min,et al.  Stochastic Performance Analysis of Network Function Virtualization in Future Internet , 2019, IEEE Journal on Selected Areas in Communications.

[72]  Sherali Zeadally,et al.  A survey on privacy protection in blockchain system , 2019, J. Netw. Comput. Appl..

[73]  Dong In Kim,et al.  Toward Secure Blockchain-Enabled Internet of Vehicles: Optimizing Consensus Management Using Reputation and Contract Theory , 2018, IEEE Transactions on Vehicular Technology.

[74]  Zhu Han,et al.  Cloud/Fog Computing Resource Management and Pricing for Blockchain Networks , 2017, IEEE Internet of Things Journal.

[75]  Hui Li,et al.  Blockchain-Based Privacy Preserving Deep Learning , 2018, Inscrypt.

[76]  Ali Balador,et al.  Malicious Node Detection in Vehicular Ad-Hoc Network Using Machine Learning and Deep Learning , 2018, 2018 IEEE Globecom Workshops (GC Wkshps).

[77]  Muhammad Shafique,et al.  Security for Machine Learning-Based Systems: Attacks and Challenges During Training and Inference , 2018, 2018 International Conference on Frontiers of Information Technology (FIT).

[78]  Jing Chen,et al.  Towards decentralized IoT security enhancement: A blockchain approach , 2018, Comput. Electr. Eng..

[79]  Albert Y. Zomaya,et al.  Network Function Virtualization in Dynamic Networks: A Stochastic Perspective , 2018, IEEE Journal on Selected Areas in Communications.

[80]  Alex Sherstinsky,et al.  Fundamentals of Recurrent Neural Network (RNN) and Long Short-Term Memory (LSTM) Network , 2018, Physica D: Nonlinear Phenomena.

[81]  Qiang Liu,et al.  A Survey of Clustering With Deep Learning: From the Perspective of Network Architecture , 2018, IEEE Access.

[82]  Cong Wang,et al.  Proof of Contribution: A Modification of Proof of Work to Increase Mining Efficiency , 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC).

[83]  Hirotsugu Kinoshita,et al.  Design Scheme of Copyright Management System Based on Digital Watermarking and Blockchain , 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC).

[84]  Amir Herzberg,et al.  Blockchain Access Privacy: Challenges and Directions , 2018, IEEE Security & Privacy.

[85]  Koh Song Sang,et al.  Reinforcement Learning for Vehicle Route Optimization in SUMO , 2018, 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS).

[86]  Marko C. J. D. van Eekelen,et al.  Applying deep learning on packet flows for botnet detection , 2018, SAC.

[87]  Xinwen Fu,et al.  A Survey on Big Data Market: Pricing, Trading and Protection , 2018, IEEE Access.

[88]  Yulei Wu,et al.  An Architecture for Accountable Anonymous Access in the Internet-of-Things Network , 2018, IEEE Access.

[89]  Naveen K. Chilamkurti,et al.  Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing , 2018, IEEE Communications Magazine.

[90]  Xin Liu,et al.  3-D Multiobjective Deployment of an Industrial Wireless Sensor Network for Maritime Applications Utilizing a Distributed Parallel Algorithm , 2018, IEEE Transactions on Industrial Informatics.

[91]  Abien Fred Agarap A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data , 2017, ICMLC.

[92]  Naveen K. Chilamkurti,et al.  Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..

[93]  Mauro Conti,et al.  A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.

[94]  Ali Dehghantanha,et al.  BoTShark: A Deep Learning Approach for Botnet Traffic Detection , 2018 .

[95]  Elaine Shi,et al.  The Sleepy Model of Consensus , 2017, ASIACRYPT.

[96]  Feifei Li,et al.  DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning , 2017, CCS.

[97]  Albert Treytl,et al.  Blockchain applications in microgrids an overview of current projects and concepts , 2017, IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society.

[98]  Zhang Zhe,et al.  A review on consensus algorithm of blockchain , 2017, 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[99]  Vitaly Shmatikov,et al.  Machine Learning Models that Remember Too Much , 2017, CCS.

[100]  Young-Sik Jeong,et al.  DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks , 2017, IEEE Communications Magazine.

[101]  K. P. Soman,et al.  Applying convolutional neural network for network intrusion detection , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[102]  Kishor S. Trivedi,et al.  Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric) , 2017, 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS).

[103]  Raquel Urtasun,et al.  Deep Spectral Clustering Learning , 2017, ICML.

[104]  Zibin Zheng,et al.  An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).

[105]  Maureen O'Hara,et al.  Footprints on a Blockchain: Trading and Information Leakage in Distributed Ledgers , 2017 .

[106]  Laura Ricci,et al.  Blockchain Based Access Control , 2017, DAIS.

[107]  Xiaolin Li,et al.  DeepDefense: Identifying DDoS Attack via Deep Learning , 2017, 2017 IEEE International Conference on Smart Computing (SMARTCOMP).

[108]  Massimo Bartoletti,et al.  A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.

[109]  Beng Chin Ooi,et al.  BLOCKBENCH: A Framework for Analyzing Private Blockchains , 2017, SIGMOD Conference.

[110]  Shin'ichi Satoh,et al.  Embedding Watermarks into Deep Neural Networks , 2017, ICMR.

[111]  Blaise Agüera y Arcas,et al.  Communication-Efficient Learning of Deep Networks from Decentralized Data , 2016, AISTATS.

[112]  Guoliang Xue,et al.  DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments , 2016, IEEE Transactions on Computers.

[113]  Sarah Underwood,et al.  Blockchain beyond bitcoin , 2016, Commun. ACM.

[114]  Arshdeep Bahga,et al.  Blockchain Platform for Industrial Internet of Things , 2016 .

[115]  Vincent Gramoli,et al.  The Blockchain Anomaly , 2016, 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA).

[116]  Howon Kim,et al.  Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).

[117]  Ghassan O. Karame,et al.  Ripple: Overview and Outlook , 2015, TRUST.

[118]  Ethan Heilman,et al.  Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.

[119]  Alex Pentland,et al.  Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.

[120]  Alex Biryukov,et al.  Bitcoin over Tor isn't a Good Idea , 2014, 2015 IEEE Symposium on Security and Privacy.

[121]  Alex Biryukov,et al.  Deanonymisation of Clients in Bitcoin P2P Network , 2014, CCS.

[122]  Stefano Zanero,et al.  BitIodine: Extracting Intelligence from the Bitcoin Network , 2014, Financial Cryptography.

[123]  Adi Shamir,et al.  Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.

[124]  Laurence T. Yang,et al.  Performance Analysis of Hybrid Wireless Networks Under Bursty and Correlated Traffic , 2013, IEEE Transactions on Vehicular Technology.

[125]  Ghassan O. Karame,et al.  Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.

[126]  Ahmed Yassin Al-Dubai,et al.  A New Analytical Model for Multi-Hop Cognitive Radio Networks , 2012, IEEE Transactions on Wireless Communications.

[127]  Shouhuai Xu,et al.  Secure and efficient proof of storage with deduplication , 2012, CODASPY '12.

[128]  Fergal Reid,et al.  An Analysis of Anonymity in the Bitcoin System , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[129]  Nancy A. Lynch,et al.  Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services , 2002, SIGA.

[130]  Leslie Lamport,et al.  Paxos Made Simple , 2001 .

[131]  Leslie Lamport,et al.  The part-time parliament , 1998, TOCS.