SecureSL: A Privacy-preserving Vertical Cooperative Learning Scheme for Web 3.0

W Yang, X Wang, Z Guan, L Wu, X Du… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Web 3.0 is the highly anticipated new evolution of the World Wide Web that promises greater
decentralization, intelligence, and security than its predecessors. Neural networks are a …

Uses and gratifications of metaverse: understanding the user adoption factors through a mixed method approach

T Natarajan, P Pragha… - Asia Pacific Journal of …, 2024 - emerald.com
Purpose Technology 4.0 comes with a challenge to understand the degree of users'
willingness to adopt a digital transformation. Metaverse, being a digital transformation …

Blockchain asset lifecycle management for visual content tracking

AC Moreaux, MP Mitrea - IEEE Access, 2023 - ieeexplore.ieee.org
With the current complexification of image manipulation technologies (ranging from color
editing or aspect ratio modifications to AI-generated fake news), many numerical …

VeriDKG: A Verifiable SPARQL Query Engine for Decentralized Knowledge Graphs

E Zhou, S Guo, Z Hong, CS Jensen, Y Xiao… - Proceedings of the …, 2023 - dl.acm.org
The ability to decentralize knowledge graphs (KG) is important to exploit the full potential of
the Semantic Web and realize the Web 3.0 vision. However, decentralization also renders …

Matrix Syncer-A Multi-chain Data Aggregator for Supporting Blockchain-Based Metaverses

X Sun, Y Lu, J Sun, B Tang, KD Rehak… - … Conference on Smart …, 2022 - Springer
Due to the rising complexity of the metaverse's business logic and the low-latency nature of
the metaverse, developers typically encounter the challenge of effectively reading, writing …

The Universal Trust Machine: A survey on the Web3 path towards enabling long term digital cooperation through decentralised trust

R Madhwal, J Pouwelse - arXiv preprint arXiv:2301.06938, 2023 - arxiv.org
Since the dawn of human civilization, trust has been the core challenge of social
organization. Trust functions to reduce the effort spent in constantly monitoring others' …

Bad Apples: Understanding the Centralized Security Risks in Decentralized Ecosystems

K Yan, J Zhang, X Liu, W Diao, S Guo - Proceedings of the ACM Web …, 2023 - dl.acm.org
The blockchain-powered decentralized applications and systems have been widely
deployed in recent years. The decentralization feature promises users anonymity, security …

Connected and Autonomous Vehicles in Web3: An Intelligence-Based Reinforcement Learning Approach

Y Ren, R Xie, FR Yu, R Zhang, Y Wang… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
“Read-write-own” based Web3 has been proposed as a promising user-centric Internet to
open the new generation of the World Wide Web, where Web3 users can independently …

Evolution of Blockchain and Smart Contracts: A State of the Art Review

K Christina, R Kesavamoorthy - 2023 International Conference …, 2023 - ieeexplore.ieee.org
Over the years, the methods of transaction have changed swiftly although the trading
process had a dynamic increase and decrease. Passing over a trajectory of greater assets in …

PASSP: A Private Authorization Scheme Oriented Service Providers

W Dai, L Yu, Y Zhou, KKR Choo, D Zou… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In our data-centric society, major service providers have access to vast amounts of user
information (eg, user-generated content such as social media posts, and device-generated …