iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1145/3657284
Artificial Intelligence for Web 3.0: A Comprehensive Survey | ACM Computing Surveys skip to main content
survey

Artificial Intelligence for Web 3.0: A Comprehensive Survey

Published: 14 May 2024 Publication History

Abstract

Web 3.0 is the next generation of the Internet built on decentralized technologies such as blockchain and cryptography. It is born to solve the problems faced by the previous generation of the Internet such as imbalanced distribution of interests, monopoly of platform resources, and leakage of personal privacy. In this survey, we discuss the latest development status of Web 3.0 and the application of emerging AI technologies in it. First, we investigate the current successful practices of Web 3.0 and various components in the current Web 3.0 ecosystem and thus propose the hierarchical architecture of the Web 3.0 ecosystem from the perspective of application scenarios. The architecture we proposed contains four layers: data management, value circulation, ecological governance, and application scenarios. We dive into the current state of development and the main challenges and issues present in each layer. In this context, we find that AI technology will have great potential. We first briefly introduce the role that artificial intelligence technology may play in the development of Web 3.0. Then, we conduct an in-depth analysis of the current application status of artificial intelligence technology in the four layers of Web 3.0 and provide some insights into its potential future development directions.

References

[1]
Messari Research. Web3: In a nutshell. [n.d.] Retrieved September 10, 2021 from https://eshita.mirror.xyz/H5bNIXATsWUv_QbbEz6lckYcgAa2rhXEPDRkecOlCOI
[2]
Yao Qian. 2022. Web3. 0: A new generation of Internet that is approaching gradually. China Finance.
[3]
Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review.
[4]
Vitalik Buterin. 2014. A next-generation smart contract and decentralized application platform. White Paper 3, 37 (2014), 2–1.
[5]
Ian Grigg. 2017. Eos-an introduction. White Paper.https://whitepaperdatabase.com/eos-whitepaper
[7]
Abhishek Gangwar, Víctor González-Castro, Enrique Alegre, and Eduardo Fidalgo. 2021. AttM-CNN: Attention and metric learning based CNN for pornography, age and Child Sexual Abuse (CSA) Detection in images. Neurocomputing 445 (2021), 81–104.
[8]
Laura Alessandretti, Abeer ElBahrawy, Luca Maria Aiello, and Andrea Baronchelli. 2018. Anticipating cryptocurrency prices using machine learning. Complexity 2018 (2018), 1–16.
[9]
Alec Radford, Jong Wook Kim, Chris Hallacy, Aditya Ramesh, Gabriel Goh, Sandhini Agarwal, Girish Sastry, Amanda Askell, Pamela Mishkin, Jack Clark, et al. 2021. Learning transferable visual models from natural language supervision. In International Conference on Machine Learning. PMLR, 8748–8763.
[10]
Sumanth Dathathri, Andrea Madotto, Janice Lan, Jane Hung, Eric Frank, Piero Molino, Jason Yosinski, and Rosanne Liu. 2019. Plug and play language models: A simple approach to controlled text generation. arXiv preprint arXiv:1912.02164 (2019).
[11]
Dipti Pawade, A. Sakhapara, Mansi Jain, and Neha Jain. 2018. Story scrambler-automatic text generation using word level RNN-LSTM. International Journal of Information Technology and Computer Science (IJITCS) 10, 6 (2018), 44–53.
[12]
Yuan Gao, Maoguo Gong, Yu Xie, and Alex Kai Qin. 2020. An attention-based unsupervised adversarial model for movie review spam detection. IEEE Transactions on Multimedia 23 (2020), 784–796.
[13]
Yuntao Wang, Zhou Su, Ning Zhang, Rui Xing, Dongxiao Liu, Tom H. Luan, and Xuemin Shen. 2022. A survey on metaverse: Fundamentals, security, and privacy. IEEE Communications Surveys & Tutorials 25, 1 (2022), 319–352.
[14]
Qinglin Yang, Yetong Zhao, Huawei Huang, Zehui Xiong, Jiawen Kang, and Zibin Zheng. 2022. Fusing blockchain and AI with metaverse: A survey. IEEE Open Journal of the Computer Society 3 (2022), 122–136.
[15]
Thien Huynh-The, Quoc-Viet Pham, Xuan-Qui Pham, Thanh Thi Nguyen, Zhu Han, and Dong-Seong Kim. 2023. Artificial intelligence for the metaverse: A survey. Engineering Applications of Artificial Intelligence 117 (2023), 105581.
[16]
Ujan Mukhopadhyay, Anthony Skjellum, Oluwakemi Hambolu, Jon Oakley, Lu Yu, and Richard Brooks. 2016. A brief survey of cryptocurrency systems. In 2016 14th Annual Conference on Privacy, Security and Trust (PST’16). IEEE, 745–752.
[17]
Javad Zarrin, Hao Wen Phang, Lakshmi Babu Saheer, and Bahram Zarrin. 2021. Blockchain for decentralization of internet: prospects, trends, and challenges. Cluster Computing 24, 4 (2021), 2841–2866.
[18]
Wenli Yang, Erfan Aghasian, Saurabh Garg, David Herbert, Leandro Disiuta, and Byeong Kang. 2019. A survey on blockchain-based internet service architecture: Requirements, challenges, trends, and future. IEEE Access 7 (2019), 75845–75872.
[19]
Komal Gilani, Emmanuel Bertin, Julien Hatin, and Noel Crespi. 2020. A survey on blockchain-based identity management and decentralized privacy for personal data. In 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS’20). IEEE, 97–101.
[20]
Tim Berners-Lee. 1989. Tim berners-lee. (1989).
[21]
Dave Raggett, Arnaud Le Hors, Ian Jacobs, et al. 1999. HTML 4.01 Specification. W3C Recommendation 24 (1999).
[22]
Roy Fielding, Jim Gettys, Jeffrey Mogul, Henrik Frystyk, Larry Masinter, Paul Leach, and Tim Berners-Lee. 1999. Hypertext Transfer Protocol–HTTP/1.1. Technical Report.
[23]
Cristina Aced Toledano. 2013. Web 2.0: The origin of the word that has changed the way we understand public relations. In Barcelona International PR Conference.
[24]
Tim Berners-Lee. [n.d.] Solid. Retrieved October 25, 2022 from https://solidproject.org/about
[25]
Web3 foundation. 2022. Web3.0 technology stack. https://web3.foundation/abou
[26]
Longbing Cao. 2022. Decentralized ai: Edge intelligence and smart blockchain, metaverse, web3, and desci. IEEE Intelligent Systems 37, 3 (2022), 6–19.
[27]
Yi Zhao, Ke Xu, Jiahui Chen, and Qi Tan. 2022. Collaboration-enabled intelligent internet architecture: Opportunities and challenges. IEEE Network 36, 5 (2022), 98–105.
[28]
William S. Noble. 2006. What is a support vector machine? Nature Biotechnology 24, 12 (2006), 1565–1567.
[29]
Roman V. Yampolskiy, Brendan Klare, and Anil K. Jain. 2012. Face recognition in the virtual world: recognizing avatar faces. In 2012 11th International Conference on Machine Learning and Applications, Vol. 1. IEEE, 40–45.
[30]
Geoffrey I. Webb, Eamonn Keogh, and Risto Miikkulainen. 2010. Naïve Bayes. Encyclopedia of Machine Learning 15 (2010), 713–714.
[31]
Josef Bauer and Dietmar Jannach. 2018. Optimal pricing in e-commerce based on sparse and noisy data. Decision Support Systems 106 (2018), 53–63.
[32]
Anthony J. Myles, Robert N. Feudale, Yang Liu, Nathaniel A. Woody, and Steven D. Brown. 2004. An introduction to decision tree modeling. Journal of Chemometrics: A Journal of the Chemometrics Society 18, 6 (2004), 275–285.
[33]
Steven J. Rigatti. 2017. Random forest. Journal of Insurance Medicine 47, 1 (2017), 31–39.
[34]
Meng Shen, Yiting Liu, Liehuang Zhu, Xiaojiang Du, and Jiankun Hu. 2021. Fine-grained webpage fingerprinting using only packet length information of encrypted traffic. IEEE Transactions on Information Forensics and Security 16 (2021), 2046–2059.
[35]
Phil Kim. 2017. Convolutional neural network. In MATLAB Deep Learning. Springer, 121–147.
[36]
Alexander Mordvintsev, Christopher Olah, and Mike Tyka. 2015. Inceptionism: Going Deeper into Neural Networks. https://research.googleblog.com/2015/06/inceptionism-going-deeper-into-neural.html
[37]
Leon A. Gatys, Alexander S. Ecker, and Matthias Bethge. 2016. Image style transfer using convolutional neural networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2414–2423.
[38]
Jianwen Chen, Kai Duan, Rumin Zhang, Liaoyuan Zeng, and Wenyi Wang. 2018. An AI based super nodes selection algorithm in blockchain networks. arXiv preprint arXiv:1808.00216 (2018).
[39]
Abdulaziz Saleh Ba Wazir, Hezerul Abdul Karim, Mohd Haris Lye Abdullah, Sarina Mansor, Nouar AlDahoul, Mohammad Faizal Ahmad Fauzi, and John See. 2020. Spectrogram-based classification of spoken foul language using deep CNN. In 2020 IEEE 22nd International Workshop on Multimedia Signal Processing (MMSP’20). IEEE, 1–6.
[40]
Abdulaziz Saleh Ba Wazir, Hezerul Abdul Karim, Mohd Haris Lye Abdullah, Nouar AlDahoul, Sarina Mansor, Mohammad Faizal Ahmad Fauzi, John See, and Ahmad Syazwan Naim. 2021. Design and implementation of fast spoken foul language recognition with different end-to-end deep neural network architectures. Sensors 21, 3 (2021), 710.
[41]
Stephen Grossberg. 2013. Recurrent neural networks. Scholarpedia 8, 2 (2013), 1888.
[42]
Qi Zhao. 2020. A deep learning framework for predicting digital asset price movement from trade-by-trade data. arXiv preprint arXiv:2010.07404 (2020).
[43]
Muhammad Saad, Jinchun Choi, DaeHun Nyang, Joongheon Kim, and Aziz Mohaisen. 2019. Toward characterizing blockchain-based cryptocurrencies for highly accurate predictions. IEEE Systems Journal 14, 1 (2019), 321–332.
[44]
Mohammad Yasser Chuttur and A. Nazurally. 2022. A multi-modal approach to detect inappropriate cartoon video contents using deep learning networks. Multimedia Tools and Applications 81, 12 (2022), 16881–16900.
[45]
Si Zhang, Hanghang Tong, Jiejun Xu, and Ross Maciejewski. 2019. Graph convolutional networks: A comprehensive review. Computational Social Networks 6, 1 (2019), 1–23.
[46]
Jie Shen, Jiajun Zhou, Yunyi Xie, Shanqing Yu, and Qi Xuan. 2021. Identity inference on blockchain using graph neural network. CoRR abs/2104.06559 (2021). https://arxiv.org/abs/2104.06559
[47]
Liang Chen, Jiaying Peng, Yang Liu, Jintang Li, Fenfang Xie, and Zibin Zheng. 2021. Phishing scams detection in ethereum transaction network. ACM Transactions on Internet Technology 21, 1 (2021), 10:1–10:16.
[48]
Meng Shen, Yiting Liu, Liehuang Zhu, Xiaojiang Du, and Jiankun Hu. 2021. Fine-grained webpage fingerprinting using only packet length information of encrypted traffic. IEEE Transactions on Information Forensics and Security 16 (2021), 2046–2059.
[49]
Rui Qin, Wenwen Ding, et al. 2022. Web3-based decentralized autonomous organizations and operations: Architectures, models, and mechanisms. IEEE Transactions on Systems, Man, and Cybernetics: Systems 53, 4 (2022), 2073–2082.
[50]
Felipe Bravo-Marquez, Steve Reeves, and Martin Ugarte. 2019. Proof-of-learning: A blockchain consensus mechanism based on machine learning competitions. In 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON’19). IEEE, 119–124.
[51]
Mehrdad Salimitari, Mohsen Joneidi, and Mainak Chatterjee. 2019. Ai-enabled blockchain: An outlier-aware consensus protocol for blockchain-based IoT networks. In 2019 IEEE Global Communications Conference (GLOBECOM’19). IEEE, 1–6.
[52]
Upal Mahbub, Jukka Komulainen, Denzil Ferreira, and Rama Chellappa. 2019. Continuous authentication of smartphones based on application usage. IEEE Transactions on Biometrics, Behavior, and Identity Science 1, 3 (2019), 165–180.
[53]
Anish Agarwal, Munther Dahleh, and Tuhin Sarkar. 2019. A marketplace for data: An algorithmic solution. In Proceedings of the 2019 ACM Conference on Economics and Computation. 701–726.
[54]
Xiaoshan Zhou and Pin-Chao Liao. 2022. A privacy-preserving data storage and service framework based on deep learning and blockchain for construction workers’ wearable IoT sensors. arXiv preprint arXiv:2211.10713 (2022).
[55]
Aitizaz Ali, Muhammad Fermi Pasha, Jehad Ali, Ong Huey Fang, Mehedi Masud, Anca Delia Jurcut, and Mohammed A. Alzain. 2022. Deep learning based homomorphic secure search-able encryption for keyword search in blockchain healthcare system: A novel approach to cryptography. Sensors 22, 2 (2022), 528.
[56]
Yang Liu, Hongsheng Wang, Mugen Peng, Jianfeng Guan, and Yu Wang. 2020. An incentive mechanism for privacy-preserving crowdsensing via deep reinforcement learning. IEEE Internet of Things Journal 8, 10 (2020), 8616–8631.
[57]
Paul P. Momtaz. 2022. Some very simple economics of web3 and the metaverse. FinTech 1, 3 (2022), 225–234.
[58]
Jia Xu, Zhengqiang Rao, Lijie Xu, Dejun Yang, and Tao Li. 2019. Incentive mechanism for multiple cooperative tasks with compatible users in mobile crowd sensing via online communities. IEEE Transactions on Mobile Computing 19, 7 (2019), 1618–1633.
[59]
Yufeng Zhan, Chi Harold Liu, Yinuo Zhao, Jiang Zhang, and Jian Tang. 2019. Free market of multi-leader multi-follower mobile crowdsensing: An incentive mechanism design by deep reinforcement learning. IEEE Transactions on Mobile Computing 19, 10 (2019), 2316–2329.
[60]
Ryoichi Shinkuma, Rieko Takagi, Yuichi Inagaki, Eiji Oki, and Fatos Xhafa. 2020. Incentive mechanism for mobile crowdsensing in spatial information prediction using machine learning. In International Conference on Advanced Information Networking and Applications. Springer, 792–803.
[61]
Danilo Coura Moreira, Eanes Torres Pereira, and Marco Alvarez. 2020. PEDA 376K: A novel dataset for deep-learning based porn-detectors. In 2020 International Joint Conference on Neural Networks (IJCNN’20). IEEE, 1–8.
[62]
Xingxin Yu, Haoyue Zhao, Botao Hou, Zonghao Ying, and Bin Wu. 2021. DeeSCVHunter: A deep learning-based framework for smart contract vulnerability detection. In 2021 International Joint Conference on Neural Networks (IJCNN’21). 1–8. DOI:
[63]
Wesley Joon-Wie Tann, Xing Jie Han, Sourav Sen Gupta, and Yew-Soon Ong. 2018. Towards safer smart contracts: A sequence learning approach to detecting vulnerabilities. CoRR abs/1811.06632 (2018). arXiv:1811.06632http://arxiv.org/abs/1811.06632
[64]
Yuan Zhuang, Zhenguang Liu, Peng Qian, Qi Liu, Xiang Wang, and Qinming He. 2021. Smart contract vulnerability detection using graph neural networks. InInternational Joint Conference on Artificial Intelligence (IJCAI’20). Article 454, 8 pages.
[65]
Chinmay Mistry, Urvish Thakker, Rajesh Gupta, Mohammad S. Obaidat, Sudeep Tanwar, Neeraj Kumar, and Joel J. P. C. Rodrigues. 2021. MedBlock: An AI-enabled and blockchain-driven medical healthcare system for COVID-19. In IEEE International Conference on Communications (ICC’21). 1–6. DOI:
[66]
Pronaya Bhattacharya, Mohammad S. Obaidat, Darshan Savaliya, Sakshi Sanghavi, Sudeep Tanwar, and Balqies Sadaun. 2022. Metaverse assisted telesurgery in healthcare 5.0: An interplay of blockchain and explainable AI. In 2022 International Conference on Computer, Information and Telecommunication Systems (CITS’22). 1–5. DOI:
[67]
Kuan-Ting Lai, Chia-Chih Lin, Chun-Yao Kang, Mei-Enn Liao, and Ming-Syan Chen. 2018. VIVID: Virtual environment for visual deep learning. In Proceedings of the 26th ACM International Conference on Multimedia. 1356–1359. DOI:
[68]
Dawei Chen, Linda Jiang Xie, BaekGyu Kim, Li Wang, Choong Seon Hong, Li-Chun Wang, and Zhu Han. 2020. Federated learning based mobile edge computing for augmented reality applications. In 2020 International Conference on Computing, Networking and Communications (ICNC’20). 767–773. DOI:
[69]
Jayneel Vora, Anand Nayyar, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar, M. S. Obaidat, and Joel J. P. C. Rodrigues. 2018. BHEEM: A blockchain-based framework for securing electronic health records. In 2018 IEEE Globecom Workshops (GC Wkshps’18). 1–6. DOI:
[70]
Chi Harold Liu, Qiuxia Lin, and Shilin Wen. 2018. Blockchain-enabled data collection and sharing for industrial IoT with deep reinforcement learning. IEEE Transactions on Industrial Informatics 15, 6 (2018), 3516–3526.
[71]
Xiao Tang, Xunqiang Lan, Lixin Li, Yan Zhang, and Zhu Han. 2022. Incentivizing proof-of-stake blockchain for secured data collection in UAV-assisted IoT: A multi-agent reinforcement learning approach. IEEE Journal on Selected Areas in Communications 40, 12 (2022), 3470–3484.
[72]
Weihua Zhuang, Qiang Ye, Feng Lyu, Nan Cheng, and Ju Ren. 2020. SDN/NFV-empowered future IoV with enhanced communication, computing, and caching. Proceedings of the IEEE 108, 2 (2020), 274–291.
[73]
Xiaobin Xu, Hui Zhao, Haipeng Yao, and Shangguang Wang. 2021. A blockchain-enabled energy-efficient data collection system for UAV-assisted IoT. IEEE Internet of Things Journal 8, 4 (2021), 2431–2443. DOI:
[74]
Jusik Yun, Yunyeong Goh, and Jong-Moon Chung. 2021. DQN-based optimization framework for secure sharded blockchain systems. IEEE Internet of Things Journal 8, 2 (2021), 708–722. DOI:
[75]
Xuetao Bai, Shanshan Tu, Muhammad Waqas, Aiming Wu, Yihe Zhang, and Yongjie Yang. 2022. Blockchain enable IoT using deep reinforcement learning: A novel architecture to ensure security of data sharing and storage. In International Conference on Artificial Intelligence and Security. Springer, 586–597.
[76]
Laizhong Cui, Xiaoxin Su, Zhongxing Ming, Ziteng Chen, Shu Yang, Yipeng Zhou, and Wei Xiao. 2022. CREAT: Blockchain-assisted compression algorithm of federated learning for content caching in edge computing. IEEE Internet of Things Journal 9, 16 (2022), 14151–14161.
[77]
Collin Farquhar, Prem Sagar Pattanshetty Vasanth Kumar, Anu Jagannath, and Jithin Jagannath. 2022. Distributed transmission control for wireless networks using multi-agent reinforcement learning. CoRR abs/2205.06800 (2022).
[78]
Nguyen Cong Luong, Tran The Anh, Huynh Thi Thanh Binh, Dusit Niyato, Dong In Kim, and Ying-Chang Liang. 2019. Joint transaction transmission and channel selection in cognitive radio based blockchain networks: A deep reinforcement learning approach. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP’19). IEEE, 8409–8413.
[79]
Jianlong Xu, Jian Lin, Wei Liang, and Kuan-Ching Li. 2022. Privacy preserving personalized blockchain reliability prediction via federated learning in IoT environments. Cluster Computing 25, 4 (2022), 2515–2526.
[80]
Zhaoxin Yang, Ruizhe Yang, F. Richard Yu, Meng Li, Yanhua Zhang, and Yinglei Teng. 2022. Sharded blockchain for collaborative computing in the internet of things: Combined of dynamic clustering and deep reinforcement learning approach. IEEE Internet of Things Journal 9, 17 (2022), 16494–16509.
[81]
Xingqiu He, Yuhang Shen, Hongxi Zhu, Sheng Wang, Chaoqun You, and Tony Q. S. Quek. 2022. Social welfare maximization for collaborative edge computing: A deep reinforcement learning-based approach. CoRR abs/2211.06861 (2022).
[82]
Zhenwei Dai, Anshumali Shrivastava, Pedro Reviriego, and José Alberto Hernández. 2022. Optimizing learned Bloom filters: How much should be learned? IEEE Embedded Systems Letters 14, 3 (2022), 123–126.
[83]
Jun Li, Yumeng Shao, Kang Wei, Ming Ding, Chuan Ma, Long Shi, Zhu Han, and H. Vincent Poor. 2021. Blockchain assisted decentralized federated learning (BLADE-FL): Performance analysis and resource allocation. CoRR abs/2101.06905 (2021).
[84]
Jin Wang, Jia Hu, Geyong Min, Albert Y. Zomaya, and Nektarios Georgalas. 2020. Fast adaptive task offloading in edge computing based on meta reinforcement learning. IEEE Transactions on Parallel and Distributed Systems 32, 1 (2020), 242–253.
[85]
Yijing Lin, Zhipeng Gao, Hongyang Du, Dusit Niyato, Jiawen Kang, Ruilong Deng, and Xuemin Sherman Shen. 2022. A unified blockchain-semantic framework for wireless edge intelligence enabled web 3.0. arXiv preprint arXiv:2210.15130 (2022).
[86]
Xuemin Shen, Jie Gao, Wen Wu, Kangjia Lyu, Mushu Li, Weihua Zhuang, Xu Li, and Jaya Rao. 2020. AI-assisted network-slicing based next-generation wireless networks. IEEE Open Journal of Vehicular Technology 1 (2020), 45–66.
[87]
Wen Wu, Nan Chen, Conghao Zhou, Mushu Li, Xuemin Shen, Weihua Zhuang, and Xu Li. 2021. Dynamic RAN slicing for service-oriented vehicular networks via constrained learning. IEEE Journal of Selected Areas in Communications 39, 7 (2021), 2076–2089.
[88]
Peilin Zheng, Zibin Zheng, and Liang Chen. 2019. Selecting reliable blockchain peers via hybrid blockchain reliability prediction. CoRR abs/1910.14614 (2019). arXiv:1910.14614http://arxiv.org/abs/1910.14614
[89]
Yunlong Lu, Xiaohong Huang, Ke Zhang, Sabita Maharjan, and Yan Zhang. 2021. Blockchain and federated learning for 5G beyond. IEEE Network 35, 1 (2021), 219–225. DOI:
[90]
Jian Chang, Binhong Li, Jiang Xiao, Licheng Lin, and Hai Jin. 2023. Anole: A Lightweight and verifiable learned-based index for time range query on blockchain systems. In Proceedings of the 28th International Conference on Database Systems for Advanced Applications (DASFAA’23), Part I (Lecture Notes in Computer Science), Xin Wang, Maria Luisa Sapino, Wook-Shin Han, Amr El Abbadi, Gill Dobbie, Zhiyong Feng, Yingxiao Shao, and Hongzhi Yin (Eds.). Vol. 13943. Springer, 519–534. DOI:
[91]
Jan Svoboda, Federico Monti, and Michael M. Bronstein. 2017. Generative convolutional networks for latent fingerprint reconstruction. In 2017 IEEE International Joint Conference on Biometrics (IJCB’17). IEEE, 429–436.
[92]
Kuo Wang and Ajay Kumar. 2019. Toward more accurate iris recognition using dilated residual features. IEEE Transactions on Information Forensics and Security 14, 12 (2019), 3233–3245.
[93]
The World Wide Web Consortium. [n.d.] Decentralized identifiers (DIDs) v1.0. Retrieved July 19, 2022 from https://www.w3.org/TR/did-core/
[94]
E Glen Weyl, Puja Ohlhaver, and Vitalik Buterin. 2022. Decentralized society: Finding web3’s soul. Available at SSRN 4105763 (2022).
[95]
David Zhang, Guangming Lu, Lei Zhang, et al. 2018. Advanced Biometrics. Springer.
[96]
Quentin Debard, Christian Wolf, Stephane Canu, and Julien Arné. 2018. Learning to recognize touch gestures: Recurrent vs. convolutional features and dynamic sampling. In 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG’18). IEEE, 114–121.
[97]
Samira Bader and Najoua Essoukri Ben Amara. 2017. Design of a 3D virtual world to implement a logical access control mechanism based on fingerprints. In 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA’17). 1239–1246. DOI:
[98]
Ruizhe Wang, Chih-Fan Chen, Hao Peng, Xudong Liu, Oliver Liu, and Xin Li. 2019. Digital twin: Acquiring high-fidelity 3D avatar from a single image. arXiv preprint arXiv:1912.03455 (2019).
[99]
Gerhard Schrotter and Christian Hürzeler. 2020. The digital twin of the city of Zurich for urban planning. PFG–Journal of Photogrammetry, Remote Sensing and Geoinformation Science 88, 1 (2020), 99–112.
[100]
Jianshan Sun, Zhiqiang Tian, Yelin Fu, Jie Geng, and Chunli Liu. 2021. Digital twins in human understanding: A deep learning-based method to recognize personality traits. International Journal of Computer Integrated Manufacturing 34, 7–8 (2021), 860–873.
[101]
Tero Karras, Samuli Laine, and Timo Aila. 2019. A style-based generator architecture for generative adversarial networks. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 4401–4410.
[102]
G. Goh, A. Ramesh, M. Pavlov, and S. Gray. [n.d.] DALL·E: Creating images from text. Retrieved January 25, 2021 from https://openai.com/blog/dall-e/
[103]
Lei Xu, Chunxiao Jiang, Yi Qian, Youjian Zhao, Jianhua Li, and Yong Ren. 2016. Dynamic privacy pricing: A multi-armed bandit approach with time-variant rewards. IEEE Transactions on Information Forensics and Security 12, 2 (2016), 271–285.
[104]
Kanishka Misra, Eric M. Schwartz, and Jacob Abernethy. 2019. Dynamic online pricing with incomplete information using multiarmed bandit experiments. Marketing Science 38, 2 (2019), 226–252.
[105]
Xuemin Shen, Jie Gao, Wen Wu, Mushu Li, Conghao Zhou, and Weihua Zhuang. 2021. Holistic network virtualization and pervasive network intelligence for 6G. IEEE Communications Surveys & Tutorials 24, 1 (2021), 1–30.
[106]
Jun-Yan Zhu, Taesung Park, Phillip Isola, and Alexei A. Efros. 2017. Unpaired image-to-image translation using cycle-consistent adversarial networks. In Proceedings of the IEEE International Conference on Computer Vision. 2223–2232.
[107]
Alex Graves. 2013. Generating sequences with recurrent neural networks. arXiv preprint arXiv:1308.0850 (2013).
[108]
Mingbo Hong, Mantao Wang, Lixin Luo, Xuefeng Tan, Dejun Zhang, and Yike Lao. 2018. Combining gated recurrent unit and attention pooling for sentimental classification. In Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence. 99–104.
[109]
Samuel R. Bowman, Luke Vilnis, Oriol Vinyals, Andrew M. Dai, Rafal Jozefowicz, and Samy Bengio. 2015. Generating sentences from a continuous space. arXiv preprint arXiv:1511.06349 (2015).
[110]
OpenAI. [n.d.]Introducing ChatGPT. Retrieved November 30, 2022 from https://openai.com/blog/chatgpt/
[111]
Huisu Jang and Jaewook Lee. 2017. An empirical study on modeling and prediction of bitcoin prices with Bayesian neural networks based on blockchain information. IEEE Access 6 (2017), 5427–5437.
[112]
Tamas Tothfalusi, Eszter Varga, Zoltan Csiszar, and Pál Varga. 2023. ML-based translation methods for protocols and data formats. In 19th International Conference on Network and Service Management (CNSM’23). IEEE, 1–5. DOI:
[113]
Rupali Sachin Vairagade and Brahmananda SH. 2022. Enabling machine learning-based side-chaining for improving QoS in blockchain-powered IoT networks. Transactions on Emerging Telecommunications Technologies 33, 4 (2022), e4433.
[114]
Jiawen Kang, Xuandi Li, Jiangtian Nie, Yi Liu, Minrui Xu, Zehui Xiong, Dusit Niyato, and Qiang Yan. 2022. Communication-efficient and cross-chain empowered federated learning for artificial intelligence of things. IEEE Transactions on Network Science and Engineering 9, 5 (2022), 2966–2977. DOI:
[115]
Yufeng Zhan and Jiang Zhang. 2020. An incentive mechanism design for efficient edge learning by deep reinforcement learning approach. In IEEE Conference on Computer Communications (IEEE INFOCOM’20). IEEE, 2489–2498.
[116]
Rongxin Xu, Shiva Raj Pokhrel, Qiujun Lan, and Gang Li. 2022. FAIR-BFL: Flexible and incentive redesign for blockchain-based federated learning. arXiv preprint arXiv:2206.12899 (2022).
[117]
Yifei Jian, Xingshu Chen, and Haizhou Wang. 2022. Fake restaurant review detection using deep neural networks with hybrid feature fusion method. In International Conference on Database Systems for Advanced Applications. Springer, 133–148.
[118]
Weili Chen, Zibin Zheng, Jiahui Cui, Edith C. H. Ngai, Peilin Zheng, and Yuren Zhou. 2018. Detecting ponzi schemes on ethereum: Towards healthier blockchain technology. In Proceedings of the 2018 World Wide Web Conference on World Wide Web (WWW’18). ACM, 1409–1418.
[119]
Jiajing Wu, Qi Yuan, Dan Lin, Wei You, Weili Chen, Chuan Chen, and Zibin Zheng. 2022. Who are the phishers? Phishing scam detection on ethereum via network embedding. IEEE Transactions on Systems, Man, and Cybernetics Systems 52, 2 (2022), 1156–1166.
[120]
Yuntao Wang, Haixia Peng, Zhou Su, Tom H. Luan, Abderrahim Benslimane, and Yuan Wu. 2022. A platform-free proof of federated learning consensus mechanism for sustainable blockchains. IEEE Journal on Selected Areas in Communications 40, 12 (2022), 3305–3324.
[121]
Yutao Jiao, Ping Wang, Dusit Niyato, Bin Lin, and Dong In Kim. 2020. Toward an automated auction framework for wireless federated learning services market. IEEE Transactions on Mobile Computing 20, 10 (2020), 3034–3048.
[122]
Yufeng Zhan, Peng Li, Zhihao Qu, Deze Zeng, and Song Guo. 2020. A learning-based incentive mechanism for federated learning. IEEE Internet of Things Journal 7, 7 (2020), 6360–6368.
[123]
Jie Zhao, Xinghua Zhu, Jianzong Wang, and Jing Xiao. 2021. Efficient client contribution evaluation for horizontal federated learning. In 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP’21). IEEE, 3060–3064.
[124]
Anchal Pandey, Sukumar Moharana, Debi Prasanna Mohanty, Archit Panwar, Dewang Agarwal, and Siva Prasad Thota. 2021. On-device content moderation. In 2021 International Joint Conference on Neural Networks (IJCNN’21). IEEE, 1–7.
[125]
Xurong Li, Kun Yu, Shouling Ji, Yan Wang, Chunming Wu, and Hui Xue. 2020. Fighting against deepfake: Patch&pair convolutional neural networks (PPCNN). In Companion Proceedings of the Web Conference 2020. 88–89.
[126]
Tianchen Zhao, Xiang Xu, Mingze Xu, Hui Ding, Yuanjun Xiong, and Wei Xia. 2021. Learning self-consistency for deepfake detection. In Proceedings of the IEEE/CVF International Conference on Computer Vision. 15023–15033.
[127]
Trisha Mittal, Uttaran Bhattacharya, Rohan Chandra, Aniket Bera, and Dinesh Manocha. 2020. Emotions don’t lie: An audio-visual deepfake detection method using affective cues. In Proceedings of the 28th ACM International Conference on Multimedia. 2823–2832.
[128]
Ziheng Hu, Hongtao Xie, Yuxin Wang, Jiahong Li, Zhongyuan Wang, and Yongdong Zhang. 2021. Dynamic inconsistency-aware deepfake video detection. In IJCAI.
[129]
Peng Wu, Jing Liu, Yujia Shi, Yujia Sun, Fangtao Shao, Zhaoyang Wu, and Zhiwei Yang. 2020. Not only look, but also listen: Learning multimodal violence detection under weak supervision. In European Conference on Computer Vision. Springer, 322–339.
[130]
Davide Cozzolino, Andreas Rössler, Justus Thies, Matthias Nießner, and Luisa Verdoliva. 2021. Id-reveal: Identity-aware deepfake video detection. In Proceedings of the IEEE/CVF International Conference on Computer Vision. 15108–15117.
[131]
Mark Weber, Giacomo Domeniconi, Jie Chen, Daniel Karl I. Weidele, Claudio Bellei, Tom Robinson, and Charles E. Leiserson. 2019. Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics. CoRR abs/1908.02591 (2019). http://arxiv.org/abs/1908.02591
[132]
Da Sun Handason Tam, Wing Cheong Lau, Bin Hu, Qiufang Ying, Dah Ming Chiu, and Hong Liu. 2019. Identifying illicit accounts in large scale e-payment networks: A Graph Representation Learning Approach. CoRR abs/1906.05546 (2019). http://arxiv.org/abs/1906.05546
[133]
Meng Shen, Zhenbo Gao, Liehuang Zhu, and Ke Xu. Efficient fine-grained website fingerprinting via encrypted traffic analysis with deep learning. In 29th IEEE/ACM International Symposium on Quality of Service (IWQOS’21). IEEE, 1–10.
[134]
Meng Shen, Mingwei Wei, Liehuang Zhu, and Mingzhong Wang. 2017. Classification of encrypted traffic with second-order Markov chains and application attribute bigrams. IEEE Transactions on Information Forensics and Security 12, 8 (2017), 1830–1843. DOI:
[135]
Meng Shen, Jinpeng Zhang, Ke Xu, Liehuang Zhu, Jiangchuan Liu, and Xiaojiang Du. DeepQoE: Real-time measurement of video QoE from encrypted traffic with deep learning. In 28th IEEE/ACM International Symposium on Quality of Service (IWQoS’20). IEEE, 1–10.
[136]
Jiasi Weng, Jian Weng, Hongwei Huang, Chengjun Cai, and Cong Wang. 2021. Fedserving: A federated prediction serving framework based on incentive mechanism. In IEEE Conference on Computer Communications (IEEE INFOCOM’21). IEEE, 1–10.
[137]
Xiaoyong Yuan and Lan Zhang. 2022. Membership inference attacks and defenses in neural network pruning. In 31st USENIX Security Symposium (USENIX Security’22). 4561–4578.
[138]
Jian An, Zhenxing Wang, Xin He, Xiaolin Gui, Jindong Cheng, and Ruowei Gui. 2022. PPQC: A blockchain-based privacy-preserving quality control mechanism in crowdsensing applications. IEEE/ACM Transactions on Networking 30, 3 (2022), 1352–1367.
[139]
Shijie Zhang, Hongzhi Yin, Tong Chen, Zi Huang, Lizhen Cui, and Xiangliang Zhang. 2021. Graph embedding for recommendation against attribute inference attacks. In Proceedings of the Web Conference 2021. 3002–3014.
[140]
Jingwei Sun, Ang Li, Binghui Wang, Huanrui Yang, Hai Li, and Yiran Chen. 2021. Soteria: Provable defense against privacy leakage in federated learning from representation perspective. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 9311–9319.
[141]
Jiahui Chen, Yi Zhao, Qi Li, Xuewei Feng, and Ke Xu. 2023. FedDef: Defense against gradient leakage in federated learning-based network intrusion detection systems. IEEE Transactions on Information Forensics and Security 18 (2023), 4561–4576.
[142]
Fergal Reid and Martin Harrigan. An analysis of anonymity in the bitcoin system. In 2011 IEEE 3rd International Conference on Privacy, Security, Risk and Trust (PASSAT’11) and 2011 IEEE 3rd International Conference on Social Computing (SocialCom’11). IEEE Computer Society, 1318–1326.
[143]
Jiajun Zhou, Chenkai Hu, Jianlei Chi, Jiajing Wu, Meng Shen, and Qi Xuan. 2022. Behavior-aware account de-anonymization on Ethereum interaction graph. IEEE Transactions on Information Forensics and Security 17 (2022), 3433–3448.
[144]
Jiajing Wu, Jieli Liu, Weili Chen, Huawei Huang, Zibin Zheng, and Yan Zhang. 2022. Detecting mixing services via mining bitcoin transaction network with hybrid motifs. IEEE Transactinos on Systems, Man, and Cybernetics Systems 52, 4 (2022), 2237–2249.
[147]
Iason Kastanis and Mel Slater. 2012. Reinforcement learning utilizes proxemics: An avatar learns to manipulate the position of people in immersive virtual reality. ACM Transactions on Applied Perception 9, 1 (2012), 1–15. DOI:
[148]
Kizashi Nakano, Daichi Horita, Naoya Isoyama, Hideaki Uchiyama, and Kiyoshi Kiyokawa. 2022. Ukemochi: A video see-through food overlay system for eating experience in the metaverse. In CHI Conference on Human Factors in Computing Systems (CHI’22), Extended Abstracts, Simone D. J. Barbosa, Cliff Lampe, Caroline Appert, and David A. Shamma (Eds.). ACM, 380:1–380:8.
[149]
Thien Huynh-The, Cam-Hao Hua, Nguyen Anh Tu, and Dong-Seong Kim. 2021. Physical activity recognition with statistical-deep fusion model using multiple sensory data for smart health. IEEE Internet of Things Journal 8, 3 (2021), 1533–1543. DOI:
[152]
Jean-Luc Lugrin and Marc Cavazza. 2006. AI-based world behaviour for emergent narratives. In Proceedings of the 2006 ACM SIGCHI International Conference on Advances in Computer Entertainment Technology. 25–es.
[153]
Y. Meng, Y. Zhan, J. Li, S. Du, H. Zhu, and X. Shen. 2023. De-anonymization attacks on metaverse (2023).
[154]
medibloc. 2023. IEEE INFOCOM 2023-IEEE Conference on Computer Communications. IEEE, 1–10. https://medibloc.com/
[155]
Polina Mamoshina, Lucy Ojomoko, Yury Yanovich, Alex Ostrovski, Alex Botezatu, Pavel Prikhodko, Eugene Izumchenko, Alexander Aliper, Konstantin Romantsov, Alexander Zhebrak, et al. 2018. Converging blockchain and next-generation artificial intelligence technologies to decentralize and accelerate biomedical research and healthcare. Oncotarget 9, 5 (2018), 5665.
[156]
Chayakrit Krittanawong, Albert J. Rogers, Mehmet Aydar, Edward Choi, Kipp W. Johnson, Zhen Wang, and Sanjiv M. Narayan. 2020. Integrating blockchain technology with artificial intelligence for cardiovascular medicine. Nature Reviews Cardiology 17, 1 (2020), 1–3.
[157]
Jan Witowski, Jongmun Choi, Soomin Jeon, Doyun Kim, Joowon Chung, John Conklin, Maria Gabriela Figueiro Longo, Marc D. Succi, and Synho Do. 2021. MarkIt: A collaborative artificial intelligence annotation platform leveraging blockchain for medical imaging research. Blockchain in Healthcare Today.

Cited By

View all
  • (2024)Blockchain Takeovers in Web 3.0: An Empirical Study on the TRON-Steem IncidentACM Transactions on the Web10.1145/3689431Online publication date: 21-Aug-2024
  • (2024)FASDSA: A Flexible Adaptive and Secure Data Sharing ArchitectureACM Transactions on Autonomous and Adaptive Systems10.1145/3688003Online publication date: 13-Aug-2024
  • (2024)Secure collaborative EHR Sharing using multi-authority attribute-based proxy re-encryption in Web 3.0Computer Networks10.1016/j.comnet.2024.110851255(110851)Online publication date: Dec-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Computing Surveys
ACM Computing Surveys  Volume 56, Issue 10
October 2024
954 pages
EISSN:1557-7341
DOI:10.1145/3613652
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 May 2024
Online AM: 11 April 2024
Accepted: 31 March 2024
Revised: 28 January 2024
Received: 26 March 2023
Published in CSUR Volume 56, Issue 10

Check for updates

Author Tags

  1. Web 3.0
  2. artificial intelligence
  3. blockchain
  4. computing network

Qualifiers

  • Survey

Funding Sources

  • National Key R&D Program of China
  • NSFC
  • Beijing Nova Program
  • Beijing Natural Science Foundation
  • National Research Foundation, Singapore
  • Infocomm Media Development Authority under its Future Communications Research & Development Programme
  • Defence Science Organisation (DSO) National Laboratories under the AI Singapore Programme
  • Singapore Ministry of Education (MOE) Tier 1

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)982
  • Downloads (Last 6 weeks)159
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Blockchain Takeovers in Web 3.0: An Empirical Study on the TRON-Steem IncidentACM Transactions on the Web10.1145/3689431Online publication date: 21-Aug-2024
  • (2024)FASDSA: A Flexible Adaptive and Secure Data Sharing ArchitectureACM Transactions on Autonomous and Adaptive Systems10.1145/3688003Online publication date: 13-Aug-2024
  • (2024)Secure collaborative EHR Sharing using multi-authority attribute-based proxy re-encryption in Web 3.0Computer Networks10.1016/j.comnet.2024.110851255(110851)Online publication date: Dec-2024
  • (2024)Membership Privacy Protection for Federated Learning in Web 3.0Security and Privacy in Web 3.010.1007/978-981-97-5752-7_4(51-70)Online publication date: 10-Jul-2024

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media