When blockchain meets auction: A comprehensive survey

X Liu, L Liu, Y Yuan, YH Long, SX Li… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Recent years have witnessed remarkable developments and increasingly deepened
integrations between blockchain as a decentralized computing architecture and auction as …

Deep reinforcement learning‐based multitask hybrid computing offloading for multiaccess edge computing

J Cai, H Fu, Y Liu - International Journal of Intelligent Systems, 2022 - Wiley Online Library
By deploying computing units in edge servers, the device‐generated computation‐intensive
tasks can be offloaded from the cloud, lessening the core network's traffic and reducing the …

Game-theoretic Designs for Blockchain-based IoT: Taxonomy and Research Directions

F Erfan, M Bellaiche, T Halabi - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
In the last few years, the combination of the Internet of Things (IoT) and blockchain
technologies has widely attracted significant research attention from academia and the …

[HTML][HTML] On-chain is not enough: Ensuring pre-data on the chain credibility for blockchain-based source-tracing systems

Y Wang, Z Wang, G Yang, S Ai, X Xiang, C Chen… - Digital Communications …, 2023 - Elsevier
The blockchain provides a reliable and scalable method for enabling source-tracing
functionality in large-scale Internet of Things (IoT) systems. Traditional blockchain-based …

Sender anonymity: Applying ring signature in gateway-based blockchain for IoT is not enough

ASV Koe, S Ai, P Huang, A Yan, J Tang, Q Chen… - Information …, 2022 - Elsevier
Over the last decade, there has been extensive research into the security and privacy of
blockchain technology, from the use of ring signatures to ring confidential transactions …

Trusted audit with untrusted auditors: A decentralized data integrity Crowdauditing approach based on blockchain

H Chen, H Zhou, J Yu, K Wu, F Liu… - … Journal of Intelligent …, 2021 - Wiley Online Library
Edge computing emerges as an alternative to cloud computing in the scenarios where the
end devices require lower latency and faster access speeds. Edge nodes are deployed at …

CCUBI: A cross‐chain based premium competition scheme with privacy preservation for usage‐based insurance

L Yi, Y Sun, B Wang, L Duan, H Ma… - … Journal of Intelligent …, 2022 - Wiley Online Library
Usage‐based insurance (UBI) provides reasonable vehicle insurance premiums based on
vehicle usage and driving behavior. In general, there are three major issues in realizing …

EviChain: A scalable blockchain for accountable intelligent surveillance systems

J Yu, H Chen, K Wu, T Zhou, Z Cai… - International Journal of …, 2022 - Wiley Online Library
Smart cameras, as typical IoT devices, are widely adopted to provide surveillance on
individuals, homes, and the environment. The unavoidably captured sensitive visuals via …

Effective combining source code and opcode for accurate vulnerability detection of smart contracts in edge AI systems

H Huang, L Guo, L Zhao, H Wang, C Xu, S Jiang - Applied Soft Computing, 2024 - Elsevier
Automating transactions using smart contracts extends the functionality of blockchains and
secures the decentralization of blockchains in edge AI systems. Whereas, since plenty of …

Non-convex optimization of resource allocation in fog computing using successive approximation

S Li, H Liu, W Li, W Sun - Journal of Systems Science and Complexity, 2024 - Springer
Fog computing can deliver low delay and advanced IT services to end users with
substantially reduced energy consumption. Nevertheless, with soaring demands for …