[HTML][HTML] Sybil in the haystack: A comprehensive review of blockchain consensus mechanisms in search of strong Sybil attack resistance

M Platt, P McBurney - Algorithms, 2023 - mdpi.com
Consensus algorithms are applied in the context of distributed computer systems to improve
their fault tolerance. The explosive development of distributed ledger technology following …

[HTML][HTML] The applicability of reinforcement learning methods in the development of industry 4.0 applications

T Kegyes, Z Süle, J Abonyi - Complexity, 2021 - hindawi.com
Reinforcement learning (RL) methods can successfully solve complex optimization
problems. Our article gives a systematic overview of major types of RL methods, their …

Toward on-device federated learning: A direct acyclic graph-based blockchain approach

M Cao, L Zhang, B Cao - IEEE Transactions on Neural …, 2021 - ieeexplore.ieee.org
Due to the distributed characteristics of federated learning (FL), the vulnerability of the global
model and the coordination of devices are the main obstacle. As a promising solution of …

Joint security and train control design in blockchain-empowered CBTC system

L Zhu, H Liang, H Wang, B Ning… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The communication-based train control (CBTC) system ensures the high efficiency and
orderliness of trains and is widely used in urban rail transit networks. The adoption of …

[HTML][HTML] Multi-agent systems in fog–cloud computing for critical healthcare task management model (CHTM) used for ECG monitoring

AA Mutlag, MK Abd Ghani, MA Mohammed, A Lakhan… - Sensors, 2021 - mdpi.com
In the last decade, the developments in healthcare technologies have been increasing
progressively in practice. Healthcare applications such as ECG monitoring, heartbeat …

DT-SSIM: A decentralized trustworthy self-sovereign identity management framework

E Samir, H Wu, M Azab, C Xin… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
In a ubiquitous environment enclosing cooperative Internet-of-Things (IoT) devices,
individuals, and entities, digital identity management (DIM) becomes critical and …

Optimal deployment mechanism of blockchain in resource-constrained IoT systems

J Zhou, G Feng, Y Wang - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
The recently emerging blockchain technology provides a promising tool to enable
endogenous security in Internet-of-Things (IoT) systems. However, when applying the …

A cross-chain trusted reputation scheme for a shared charging platform based on blockchain

Y He, C Zhang, B Wu, Y Yang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
With the development of electric vehicles, the shortage of charging piles (CPs) has gradually
been exposed. In response to this situation, CP operators have taken private CPs into the …

Trusted resource allocation based on smart contracts for blockchain-enabled internet of things

H Cheng, Q Hu, X Zhang, Z Yu… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
By sharing resources between edge servers and end users, edge-end cooperation is one
important way to support various applications in Internet of Things, which have critical …

Def-DReL: Towards a sustainable serverless functions deployment strategy for fog-cloud environments using deep reinforcement learning

CK Dehury, S Poojara, SN Srirama - Applied Soft Computing, 2024 - Elsevier
Modern cloud applications are composed of tens of thousands of environment-agnostic
serverless functions that can be deployed in either a fog or cloud environment. The key to …