Deep learningAIMachine learningFederated learningBlockchainEthereumSmart contractsSecurityTransparencyDeep learning has gained huge traction in recent years because of its potential to make informed decisions. A large portion of today's deep learning systems are based on centralized servers and fall short ...
Through carefully screening, most relevant studies are included and research questions cover the potential security and privacy attacks in traditional federated learning that can be solved by blockchain as well as the characteristics of Blockchain-based FL. In addition, the latest Blockchain-based ...
Keeping in view of the constraints and challenges with respect to big data analytics along with security and privacy preservation for 5G and B5G applications, the integration of machine learning and blockchain, two of the most promising technologies of the modern era is inevitable. IoT设备介绍 ...
The section further provides a comparison between the traditional databases and blockchain-based on multiple characteristics. Section 6 presents the use-cases of blockchain technology. It also provides a discussion on passwordless authentication using blockchain technology. The section also discusses the ...
Next, we extensively discuss blockchain-based methods for the metaverse from technical perspectives, such as data acquisition, data storage, data sharing, data interoperability, and data privacy preservation. For each perspective, we first discuss the technical challenges of the metaverse and then high...
For each cluster, and based on the pool of articles included in it, we apply an inductive method of reasoning and discuss the emerging themes and applications of blockchains for supply chains, logistics and transport. We conclude by discussing the main themes for future research on blockchain ...
Integration of emerging technologies: ML in cybersecurity will integrate with virtualization, blockchain, big data, and cloud computing to enhance threat detection, data protection, and scalability, addressing complex and large-scale cyber threats efficiently [58]. ...
of data pipeline approaches in serverless computing. Classification is based on architectural features, data processing techniques, and workflow orchestration mechanisms, these approaches are categorized into three primary methods: heuristic-based approach, Machine learning-based approach, and framework-based ...
Zhao Y et al (2021) Privacy-Preserving Blockchain-Based Federated Learning for IoT Devices. IEEE Internet Things J 8(3):1817–1829.https://doi.org/10.1109/JIOT.2020.3017377 https://doi.org/10.1016/j.promfg.2015.07.514 https://doi.org/10.1145/3451163 ...
In the distributed large-scale neural network used, multiple edge nodes were used for local updates. To manage this scenario, a secure node selection method based on a blockchain-based random client selection method was introduced. Using this method resulted in improved privacy (Qammar et al.202...