Deep reinforcement learning for blockchain in industrial IoT: A survey
暂无分享,去创建一个
Victor C. M. Leung | Yulei Wu | Yuxiang Ma | Zehua Wang | Zehua Wang | V. Leung | Yulei Wu | Yuxiang Ma
[1] M. Shamim Hossain,et al. A Secure Data Aggregation Strategy in Edge Computing and Blockchain empowered Internet of Things , 2020 .
[2] Geyong Min,et al. A Graph Neural Network-Based Digital Twin for Network Slicing Management , 2022, IEEE Transactions on Industrial Informatics.
[3] Klaus Moessner,et al. Radio Resource Management Approaches for Reliable Device-to-Device (D2D) Communication in Wireless Industrial Applications , 2021, IEEE Transactions on Cognitive Communications and Networking.
[4] Xiaofei Wang,et al. Networking Integrated Cloud–Edge–End in IoT: A Blockchain-Assisted Collective Q-Learning Approach , 2021, IEEE Internet of Things Journal.
[5] Gihan J. Mendis,et al. DDLPF: A Practical Decentralized Deep Learning Paradigm for Internet-of-Things Applications , 2021, IEEE Internet of Things Journal.
[6] Yulei Wu,et al. Robust Learning-Enabled Intelligence for the Internet of Things: A Survey From the Perspectives of Noisy Data and Adversarial Examples , 2021, IEEE Internet of Things Journal.
[7] Benjamin Turnbull,et al. A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks , 2021, IEEE Internet of Things Journal.
[8] Mauro Iacono,et al. Designing a GDPR compliant blockchain-based IoV distributed information tracking system , 2021, Inf. Process. Manag..
[9] Jianhua Ma,et al. Variational LSTM Enhanced Anomaly Detection for Industrial Big Data , 2021, IEEE Transactions on Industrial Informatics.
[10] Weishan Zhang,et al. Blockchain-Based Federated Learning for Device Failure Detection in Industrial IoT , 2021, IEEE Internet of Things Journal.
[11] Athanasios V. Vasilakos,et al. Designing Blockchain-Based Access Control Protocol in IoT-Enabled Smart-Grid System , 2021, IEEE Internet of Things Journal.
[12] Yan Zhang,et al. Consortium Blockchain for Secure Resource Sharing in Vehicular Edge Computing: A Contract-Based Approach , 2021, IEEE Transactions on Network Science and Engineering.
[13] Laurence Tianruo Yang,et al. A Tensor-Based Multiattributes Visual Feature Recognition Method for Industrial Intelligence , 2021, IEEE Transactions on Industrial Informatics.
[14] Hao Wang,et al. Convergence of Blockchain and Edge Computing for Secure and Scalable IIoT Critical Infrastructures in Industry 4.0 , 2021, IEEE Internet of Things Journal.
[15] Shengli Xie,et al. NOMA-Enabled Cooperative Computation Offloading for Blockchain-Empowered Internet of Things: A Learning Approach , 2021, IEEE Internet of Things Journal.
[16] Xiaohong Huang,et al. Communication-efficient Federated Learning and Permissioned Blockchain for Digital Twin Edge Networks , 2022 .
[17] Laurence T. Yang,et al. Deep Correlation Mining Based on Hierarchical Hybrid Networks for Heterogeneous Big Data Recommendations , 2021, IEEE Transactions on Computational Social Systems.
[18] Guanghui Wen,et al. Trusted-Region Subsequence Reduction for Designing Resilient Consensus Algorithms , 2021, IEEE Transactions on Network Science and Engineering.
[19] Hong-Ning Dai,et al. Deep learning for privacy preservation in autonomous moving platforms enhanced 5G heterogeneous networks , 2020, Comput. Networks.
[20] Yulei Wu,et al. Cloud-Edge Orchestration for the Internet of Things: Architecture and AI-Powered Data Processing , 2020, IEEE Internet of Things Journal.
[21] Zibin Zheng,et al. A Blockchain-Based Decentralized Federated Learning Framework with Committee Consensus , 2020, IEEE Network.
[22] Yue Zhang,et al. DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-Based Incentive , 2019, IEEE Transactions on Dependable and Secure Computing.
[23] Yuefeng Du,et al. Towards Private, Robust, and Verifiable Crowdsensing Systems via Public Blockchains , 2019, IEEE Transactions on Dependable and Secure Computing.
[24] Hui Lin,et al. A new data clustering strategy for enhancing mutual privacy in healthcare IoT systems , 2020, Future Gener. Comput. Syst..
[25] Lin Guan,et al. Real-time deep reinforcement learning based vehicle navigation , 2020, Appl. Soft Comput..
[26] Jing Xu,et al. Dumbo: Faster Asynchronous BFT Protocols , 2020, IACR Cryptol. ePrint Arch..
[27] Houbing Song,et al. A Many-Objective Optimization Model of Industrial Internet of Things Based on Private Blockchain , 2020, IEEE Network.
[28] Moayad Aloqaily,et al. An incentive-aware blockchain-based solution for internet of fake media things , 2020, Inf. Process. Manag..
[29] An Liu,et al. CPchain: A Copyright-Preserving Crowdsourcing Data Trading Framework Based on Blockchain , 2020, 2020 29th International Conference on Computer Communications and Networks (ICCCN).
[30] F. Richard Yu,et al. Resource Optimization for Delay-Tolerant Data in Blockchain-Enabled IoT With Edge Computing: A Deep Reinforcement Learning Approach , 2020, IEEE Internet of Things Journal.
[31] Gautam Srivastava,et al. Blockchain Technology and Neural Networks for the Internet of Medical Things , 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[32] Ali Kashif Bashir,et al. Collaborative Trust Blockchain Based Unbiased Control Transfer Mechanism for Industrial Automation , 2020, IEEE Transactions on Industry Applications.
[33] Siya Xu,et al. Trusted Cloud-Edge Network Resource Management: DRL-Driven Service Function Chain Orchestration for IoT , 2020, IEEE Internet of Things Journal.
[34] Jun Li,et al. APCN: A scalable architecture for balancing accountability and privacy in large-scale content-based networks , 2020, Inf. Sci..
[35] Moayad Aloqaily,et al. A Blockchain-Based Decentralized Composition Solution for IoT Services , 2020, ICC 2020 - 2020 IEEE International Conference on Communications (ICC).
[36] Yan Zhang,et al. Blockchain and Federated Learning for Privacy-Preserved Data Sharing in Industrial IoT , 2020, IEEE Transactions on Industrial Informatics.
[37] Tong Li,et al. Automatic Virtual Network Embedding: A Deep Reinforcement Learning Approach With Graph Convolutional Networks , 2020, IEEE Journal on Selected Areas in Communications.
[38] Kevin I-Kai Wang,et al. Deep-Learning-Enhanced Human Activity Recognition for Internet of Healthcare Things , 2020, IEEE Internet of Things Journal.
[39] Ke Xu,et al. Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT , 2020, IEEE Journal on Selected Areas in Communications.
[40] Qianbin Chen,et al. Blockchain-Enabled Software-Defined Industrial Internet of Things With Deep Reinforcement Learning , 2020, IEEE Internet of Things Journal.
[41] Dusit Niyato,et al. Distributed Dynamic Resource Management and Pricing in the IoT Systems With Blockchain-as-a-Service and UAV-Enabled Mobile Edge Computing , 2020, IEEE Internet of Things Journal.
[42] Ahmed Farouk,et al. Blockchain platform for industrial healthcare: Vision and future opportunities , 2020, Comput. Commun..
[43] Yulei Wu,et al. Toward Optimal Resource Scheduling for Internet of Things Under Imperfect CSI , 2020, IEEE Internet of Things Journal.
[44] Yulei Wu,et al. An Efficient Collaboration and Incentive Mechanism for Internet of Vehicles (IoV) With Secured Information Exchange Based on Blockchains , 2020, IEEE Internet of Things Journal.
[45] Haipeng Yao,et al. A Service-Oriented Permissioned Blockchain for the Internet of Things , 2020, IEEE Transactions on Services Computing.
[46] Dongxi Liu,et al. A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems , 2020, IEEE Transactions on Industrial Informatics.
[47] Hanlei Wang,et al. Differential-cascade framework for consensus of networked Lagrangian systems , 2020, Autom..
[48] Yulei Wu,et al. FDC: A Secure Federated Deep Learning Mechanism for Data Collaborations in the Internet of Things , 2020, IEEE Internet of Things Journal.
[49] Yulei Wu,et al. An Intelligent Anomaly Detection Scheme for Micro-Services Architectures With Temporal and Spatial Data Analysis , 2020, IEEE Transactions on Cognitive Communications and Networking.
[50] Anit Kumar Sahu,et al. Federated Learning: Challenges, Methods, and Future Directions , 2019, IEEE Signal Processing Magazine.
[51] Yike Guo,et al. GDPR-Compliant Personal Data Management: A Blockchain-Based Solution , 2019, IEEE Transactions on Information Forensics and Security.
[52] Peng Jiang,et al. A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..
[53] Di Wu,et al. When Deep Reinforcement Learning Meets Federated Learning: Intelligent Multi-Timescale Resource Management for Multi-access Edge Computing in 5G Ultra Dense Network , 2020, ArXiv.
[54] Weidong Xiao,et al. A Blockchain-Based Traceable IP Copyright Protection Algorithm , 2020, IEEE Access.
[55] Wei-Chiang Hong,et al. Machine Learning Adoption in Blockchain-Based Smart Applications: The Challenges, and a Way Forward , 2020, IEEE Access.
[56] Yulei Wu,et al. A New Bitcoin Address Association Method Using a Two-Level Learner Model , 2019, ICA3PP.
[57] Soo Young Shin,et al. BUAV: A blockchain based secure UAV-assisted data acquisition scheme in Internet of Things , 2019, Journal of Communications and Networks.
[58] Miaowen Wen,et al. MBID: Micro-Blockchain-Based Geographical Dynamic Intrusion Detection for V2X , 2019, IEEE Communications Magazine.
[59] Jinjun Chen,et al. Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions , 2019, Future Gener. Comput. Syst..
[60] Sukumar Nandi,et al. Managing Smart Home Appliances with Proof of Authority and Blockchain , 2019, I4CS.
[61] Ning Zhang,et al. A Secure Charging Scheme for Electric Vehicles With Smart Communities in Energy Blockchain , 2019, IEEE Internet of Things Journal.
[62] Jie Xu,et al. Data-driven dynamic resource scheduling for network slicing: A Deep reinforcement learning approach , 2019, Inf. Sci..
[63] Rajesh Kumar,et al. A Hybrid Technique To Detect Botnets, Based on P2P Traffic Similarity , 2019, 2019 Cybersecurity and Cyberforensics Conference (CCC).
[64] Mehmet A. Orgun,et al. A Proof-of-Trust Consensus Protocol for Enhancing Accountability in Crowdsourcing Services , 2019, IEEE Transactions on Services Computing.
[65] Hong-Ning Dai,et al. SCTSC: A Semicentralized Traffic Signal Control Mode With Attribute-Based Blockchain in IoVs , 2019, IEEE Transactions on Computational Social Systems.
[66] A. Shahaab,et al. Applicability and Appropriateness of Distributed Ledgers Consensus Protocols in Public and Private Sectors: A Systematic Review , 2019, IEEE Access.
[67] Haipeng Yao,et al. Resource Trading in Blockchain-Based Industrial Internet of Things , 2019, IEEE Transactions on Industrial Informatics.
[68] Eul Gyu Im,et al. A Multimodal Deep Learning Method for Android Malware Detection Using Various Features , 2019, IEEE Transactions on Information Forensics and Security.
[69] Qiang Yang,et al. Federated Machine Learning , 2019, ACM Trans. Intell. Syst. Technol..
[70] F. Richard Yu,et al. Integrated Blockchain and Edge Computing Systems: A Survey, Some Research Issues and Challenges , 2019, IEEE Communications Surveys & Tutorials.
[71] Geyong Min,et al. Stochastic Performance Analysis of Network Function Virtualization in Future Internet , 2019, IEEE Journal on Selected Areas in Communications.
[72] Sherali Zeadally,et al. A survey on privacy protection in blockchain system , 2019, J. Netw. Comput. Appl..
[73] Dong In Kim,et al. Toward Secure Blockchain-Enabled Internet of Vehicles: Optimizing Consensus Management Using Reputation and Contract Theory , 2018, IEEE Transactions on Vehicular Technology.
[74] Zhu Han,et al. Cloud/Fog Computing Resource Management and Pricing for Blockchain Networks , 2017, IEEE Internet of Things Journal.
[75] Hui Li,et al. Blockchain-Based Privacy Preserving Deep Learning , 2018, Inscrypt.
[76] Ali Balador,et al. Malicious Node Detection in Vehicular Ad-Hoc Network Using Machine Learning and Deep Learning , 2018, 2018 IEEE Globecom Workshops (GC Wkshps).
[77] Muhammad Shafique,et al. Security for Machine Learning-Based Systems: Attacks and Challenges During Training and Inference , 2018, 2018 International Conference on Frontiers of Information Technology (FIT).
[78] Jing Chen,et al. Towards decentralized IoT security enhancement: A blockchain approach , 2018, Comput. Electr. Eng..
[79] Albert Y. Zomaya,et al. Network Function Virtualization in Dynamic Networks: A Stochastic Perspective , 2018, IEEE Journal on Selected Areas in Communications.
[80] Alex Sherstinsky,et al. Fundamentals of Recurrent Neural Network (RNN) and Long Short-Term Memory (LSTM) Network , 2018, Physica D: Nonlinear Phenomena.
[81] Qiang Liu,et al. A Survey of Clustering With Deep Learning: From the Perspective of Network Architecture , 2018, IEEE Access.
[82] Cong Wang,et al. Proof of Contribution: A Modification of Proof of Work to Increase Mining Efficiency , 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC).
[83] Hirotsugu Kinoshita,et al. Design Scheme of Copyright Management System Based on Digital Watermarking and Blockchain , 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC).
[84] Amir Herzberg,et al. Blockchain Access Privacy: Challenges and Directions , 2018, IEEE Security & Privacy.
[85] Koh Song Sang,et al. Reinforcement Learning for Vehicle Route Optimization in SUMO , 2018, 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS).
[86] Marko C. J. D. van Eekelen,et al. Applying deep learning on packet flows for botnet detection , 2018, SAC.
[87] Xinwen Fu,et al. A Survey on Big Data Market: Pricing, Trading and Protection , 2018, IEEE Access.
[88] Yulei Wu,et al. An Architecture for Accountable Anonymous Access in the Internet-of-Things Network , 2018, IEEE Access.
[89] Naveen K. Chilamkurti,et al. Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing , 2018, IEEE Communications Magazine.
[90] Xin Liu,et al. 3-D Multiobjective Deployment of an Industrial Wireless Sensor Network for Maritime Applications Utilizing a Distributed Parallel Algorithm , 2018, IEEE Transactions on Industrial Informatics.
[91] Abien Fred Agarap. A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data , 2017, ICMLC.
[92] Naveen K. Chilamkurti,et al. Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..
[93] Mauro Conti,et al. A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.
[94] Ali Dehghantanha,et al. BoTShark: A Deep Learning Approach for Botnet Traffic Detection , 2018 .
[95] Elaine Shi,et al. The Sleepy Model of Consensus , 2017, ASIACRYPT.
[96] Feifei Li,et al. DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning , 2017, CCS.
[97] Albert Treytl,et al. Blockchain applications in microgrids an overview of current projects and concepts , 2017, IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society.
[98] Zhang Zhe,et al. A review on consensus algorithm of blockchain , 2017, 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[99] Vitaly Shmatikov,et al. Machine Learning Models that Remember Too Much , 2017, CCS.
[100] Young-Sik Jeong,et al. DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks , 2017, IEEE Communications Magazine.
[101] K. P. Soman,et al. Applying convolutional neural network for network intrusion detection , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[102] Kishor S. Trivedi,et al. Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric) , 2017, 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS).
[103] Raquel Urtasun,et al. Deep Spectral Clustering Learning , 2017, ICML.
[104] Zibin Zheng,et al. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).
[105] Maureen O'Hara,et al. Footprints on a Blockchain: Trading and Information Leakage in Distributed Ledgers , 2017 .
[106] Laura Ricci,et al. Blockchain Based Access Control , 2017, DAIS.
[107] Xiaolin Li,et al. DeepDefense: Identifying DDoS Attack via Deep Learning , 2017, 2017 IEEE International Conference on Smart Computing (SMARTCOMP).
[108] Massimo Bartoletti,et al. A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.
[109] Beng Chin Ooi,et al. BLOCKBENCH: A Framework for Analyzing Private Blockchains , 2017, SIGMOD Conference.
[110] Shin'ichi Satoh,et al. Embedding Watermarks into Deep Neural Networks , 2017, ICMR.
[111] Blaise Agüera y Arcas,et al. Communication-Efficient Learning of Deep Networks from Decentralized Data , 2016, AISTATS.
[112] Guoliang Xue,et al. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments , 2016, IEEE Transactions on Computers.
[113] Sarah Underwood,et al. Blockchain beyond bitcoin , 2016, Commun. ACM.
[114] Arshdeep Bahga,et al. Blockchain Platform for Industrial Internet of Things , 2016 .
[115] Vincent Gramoli,et al. The Blockchain Anomaly , 2016, 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA).
[116] Howon Kim,et al. Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).
[117] Ghassan O. Karame,et al. Ripple: Overview and Outlook , 2015, TRUST.
[118] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[119] Alex Pentland,et al. Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.
[120] Alex Biryukov,et al. Bitcoin over Tor isn't a Good Idea , 2014, 2015 IEEE Symposium on Security and Privacy.
[121] Alex Biryukov,et al. Deanonymisation of Clients in Bitcoin P2P Network , 2014, CCS.
[122] Stefano Zanero,et al. BitIodine: Extracting Intelligence from the Bitcoin Network , 2014, Financial Cryptography.
[123] Adi Shamir,et al. Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.
[124] Laurence T. Yang,et al. Performance Analysis of Hybrid Wireless Networks Under Bursty and Correlated Traffic , 2013, IEEE Transactions on Vehicular Technology.
[125] Ghassan O. Karame,et al. Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.
[126] Ahmed Yassin Al-Dubai,et al. A New Analytical Model for Multi-Hop Cognitive Radio Networks , 2012, IEEE Transactions on Wireless Communications.
[127] Shouhuai Xu,et al. Secure and efficient proof of storage with deduplication , 2012, CODASPY '12.
[128] Fergal Reid,et al. An Analysis of Anonymity in the Bitcoin System , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[129] Nancy A. Lynch,et al. Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services , 2002, SIGA.
[130] Leslie Lamport,et al. Paxos Made Simple , 2001 .
[131] Leslie Lamport,et al. The part-time parliament , 1998, TOCS.