A comprehensive survey on machine learning techniques in opportunistic networks: Advances, challenges and future directions

J Gandhi, Z Narmawala - Pervasive and Mobile Computing, 2024 - Elsevier
Abstract Machine Learning (ML) is growing in popularity and is applied in numerous fields to
solve complex problems. Opportunistic Networks are a type of Ad-hoc Network where a …

The Eternal Tussle: Exploring the Role of Centralization in {IPFS}

Y Wei, D Trautwein, Y Psaras, I Castro, W Scott… - … USENIX Symposium on …, 2024 - usenix.org
Web centralization and consolidation has created potential single points of failure, eg, in
areas such as content hosting, name resolution, and certification. The" Decentralized Web" …

Blockchain-enabled auction for cloud resource provisioning: a survey on trust and economy

R Singhal, V Sharma, I Singhal, V Bansal - International Journal of System …, 2024 - Springer
Blockchain has become a game-changing technology in the dynamic world of technological
breakthroughs, offering a variety of benefits to enterprises. The blockchain-enabled auction …

Protecting the decentralized future: An exploration of common blockchain attacks and their countermeasures

B Saha, MM Hasan, N Anjum, S Tahora… - arXiv preprint arXiv …, 2023 - arxiv.org
Blockchain technology transformed the digital sphere by providing a transparent, secure,
and decentralized platform for data security across a range of industries, including …

Tit-for-Token: fair rewards for moving data in decentralized storage networks

VH Lakhani, L Jehl, G Ishmaev… - arXiv preprint arXiv …, 2023 - arxiv.org
Centralized data silos are not only becoming prohibitively expensive but also raise issues of
data ownership and data availability. These developments are affecting the industry …

StealthPath: Privacy-preserving Path Validation in the Data Plane of Path-Aware Networks

J Li, Y Su, R Lu, Z Su, W Meng… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Network path validation aims to give more control over the forwarding path of data packets in
a path-aware network, which shields the network from security threats and allows end hosts …

Incentive Mechanism for Resource Trading in Video Analytic Services Using Reinforcement Learning

N He, S Yang, F Li, L Zhu, L Sun… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Video analytics play a pivotal role in enhancing the safety of intelligent surveillance and
autonomous driving. However, the transmission of vast video data and the computational …

Data sharing and exchanging with incentive and optimization: a survey

L Liu, M Han - Discover Data, 2024 - Springer
As the landscape of big data evolves, the paradigm of data sharing and exchanging has
gained paramount importance. Nonetheless, the transition to efficient data sharing and …

A Survey of Decomposition-Based Evolutionary Multi-Objective Optimization: Part II--A Data Science Perspective

M Huang, K Li - arXiv preprint arXiv:2404.14228, 2024 - arxiv.org
This paper presents the second part of the two-part survey series on decomposition-based
evolutionary multi-objective optimization where we mainly focus on discussing the literature …

[PDF][PDF] TIT-FOR-TOKEN: UNDERSTANDING FAIRNESS WHEN FORWARDING DATA BY INCENTIVIZED PEERS IN DECENTRALIZED STORAGE NETWORKS

VH Lakhani, A Babaei, L Jehl, G Ishmaev… - arXiv preprint arXiv …, 2023 - researchgate.net
Decentralized storage networks offer services with intriguing possibilities to reduce
inequalities in an extremely centralized market. The challenge is to conceive incentives that …