{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T01:18:55Z","timestamp":1777339135617,"version":"3.51.4"},"reference-count":157,"publisher":"Association for Computing Machinery (ACM)","issue":"10","license":[{"start":{"date-parts":[[2024,5,14]],"date-time":"2024-05-14T00:00:00Z","timestamp":1715644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2023YFB2703800"],"award-info":[{"award-number":["2023YFB2703800"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["62222201 and U23A20304"],"award-info":[{"award-number":["62222201 and U23A20304"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100005090","name":"Beijing Nova Program","doi-asserted-by":"crossref","award":["20220484174"],"award-info":[{"award-number":["20220484174"]}],"id":[{"id":"10.13039\/501100005090","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Beijing Natural Science Foundation","award":["M23020"],"award-info":[{"award-number":["M23020"]}]},{"DOI":"10.13039\/501100001381","name":"National Research Foundation, Singapore","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Infocomm Media Development Authority under its Future Communications Research & Development Programme"},{"name":"Defence Science Organisation (DSO) National Laboratories under the AI Singapore Programme","award":["AISG2-RP-2020-019 and FCP-ASTAR-TG-2022-003"],"award-info":[{"award-number":["AISG2-RP-2020-019 and FCP-ASTAR-TG-2022-003"]}]},{"name":"Singapore Ministry of Education (MOE) Tier 1","award":["RG87\/22"],"award-info":[{"award-number":["RG87\/22"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2024,10,31]]},"abstract":"<jats:p>Web 3.0 is the next generation of the Internet built on decentralized technologies such as blockchain and cryptography. It is born to solve the problems faced by the previous generation of the Internet such as imbalanced distribution of interests, monopoly of platform resources, and leakage of personal privacy. In this survey, we discuss the latest development status of Web 3.0 and the application of emerging AI technologies in it. First, we investigate the current successful practices of Web 3.0 and various components in the current Web 3.0 ecosystem and thus propose the hierarchical architecture of the Web 3.0 ecosystem from the perspective of application scenarios. The architecture we proposed contains four layers: data management, value circulation, ecological governance, and application scenarios. We dive into the current state of development and the main challenges and issues present in each layer. In this context, we find that AI technology will have great potential. We first briefly introduce the role that artificial intelligence technology may play in the development of Web 3.0. Then, we conduct an in-depth analysis of the current application status of artificial intelligence technology in the four layers of Web 3.0 and provide some insights into its potential future development directions.<\/jats:p>","DOI":"10.1145\/3657284","type":"journal-article","created":{"date-parts":[[2024,4,11]],"date-time":"2024-04-11T09:55:43Z","timestamp":1712829343000},"page":"1-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Artificial Intelligence for Web 3.0: A Comprehensive Survey"],"prefix":"10.1145","volume":"56","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1867-0972","authenticated-orcid":false,"given":"Meng","family":"Shen","sequence":"first","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9192-0422","authenticated-orcid":false,"given":"Zhehui","family":"Tan","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7442-7416","authenticated-orcid":false,"given":"Dusit","family":"Niyato","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2084-7695","authenticated-orcid":false,"given":"Yuzhi","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8218-3490","authenticated-orcid":false,"given":"Jiawen","family":"Kang","sequence":"additional","affiliation":[{"name":"Guangdong University of Technology, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4440-941X","authenticated-orcid":false,"given":"Zehui","family":"Xiong","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3277-3887","authenticated-orcid":false,"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5974-1589","authenticated-orcid":false,"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4140-287X","authenticated-orcid":false,"given":"Xuemin (Sherman)","family":"Shen","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, Canada"}]}],"member":"320","published-online":{"date-parts":[[2024,5,14]]},"reference":[{"key":"e_1_3_1_2_2","unstructured":"Messari Research. Web3: In a nutshell. [n.d.] Retrieved September 10 2021 from https:\/\/eshita.mirror.xyz\/H5bNIXATsWUv_QbbEz6lckYcgAa2rhXEPDRkecOlCOI"},{"key":"e_1_3_1_3_2","article-title":"Web3. 0: A new generation of Internet that is approaching gradually","author":"Qian Yao","year":"2022","unstructured":"Yao Qian. 2022. Web3. 0: A new generation of Internet that is approaching gradually. China Finance.","journal-title":"China Finance"},{"key":"e_1_3_1_4_2","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review.","journal-title":"Decentralized Business Review"},{"issue":"37","key":"e_1_3_1_5_2","article-title":"A next-generation smart contract and decentralized application platform","volume":"3","author":"Buterin Vitalik","year":"2014","unstructured":"Vitalik Buterin. 2014. A next-generation smart contract and decentralized application platform. White Paper 3, 37 (2014), 2\u20131.","journal-title":"White Paper"},{"key":"e_1_3_1_6_2","article-title":"Eos-an introduction","author":"Grigg Ian","year":"2017","unstructured":"Ian Grigg. 2017. Eos-an introduction. White Paper.https:\/\/whitepaperdatabase.com\/eos-whitepaper","journal-title":"White Paper."},{"key":"e_1_3_1_7_2","unstructured":"nostr. [n.d.]https:\/\/nostr.com\/"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.02.056"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/8983590"},{"key":"e_1_3_1_10_2","first-page":"8748","volume-title":"International Conference on Machine Learning","author":"Radford Alec","year":"2021","unstructured":"Alec Radford, Jong Wook Kim, Chris Hallacy, Aditya Ramesh, Gabriel Goh, Sandhini Agarwal, Girish Sastry, Amanda Askell, Pamela Mishkin, Jack Clark, et\u00a0al. 2021. Learning transferable visual models from natural language supervision. In International Conference on Machine Learning. PMLR, 8748\u20138763."},{"key":"e_1_3_1_11_2","article-title":"Plug and play language models: A simple approach to controlled text generation","author":"Dathathri Sumanth","year":"2019","unstructured":"Sumanth Dathathri, Andrea Madotto, Janice Lan, Jane Hung, Eric Frank, Piero Molino, Jason Yosinski, and Rosanne Liu. 2019. Plug and play language models: A simple approach to controlled text generation. arXiv preprint arXiv:1912.02164 (2019).","journal-title":"arXiv preprint arXiv:1912.02164"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.5815\/ijitcs.2018.06.05"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.2990085"},{"key":"e_1_3_1_14_2","article-title":"A survey on metaverse: Fundamentals, security, and privacy","author":"Wang Yuntao","year":"2022","unstructured":"Yuntao Wang, Zhou Su, Ning Zhang, Rui Xing, Dongxiao Liu, Tom H. Luan, and Xuemin Shen. 2022. A survey on metaverse: Fundamentals, security, and privacy. IEEE Communications Surveys & Tutorials 25, 1 (2022), 319\u2013352.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2022.3188249"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105581"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906988"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03301-8"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2917562"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/BRAINS49436.2020.9223312"},{"key":"e_1_3_1_21_2","unstructured":"Tim Berners-Lee. 1989. Tim berners-lee. (1989)."},{"key":"e_1_3_1_22_2","article-title":"HTML 4.01 Specification","volume":"24","author":"Raggett Dave","year":"1999","unstructured":"Dave Raggett, Arnaud Le Hors, Ian Jacobs, et\u00a0al. 1999. HTML 4.01 Specification. W3C Recommendation 24 (1999).","journal-title":"W3C Recommendation"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2616"},{"key":"e_1_3_1_24_2","volume-title":"Barcelona International PR Conference","author":"Toledano Cristina Aced","year":"2013","unstructured":"Cristina Aced Toledano. 2013. Web 2.0: The origin of the word that has changed the way we understand public relations. In Barcelona International PR Conference."},{"key":"e_1_3_1_25_2","unstructured":"Tim Berners-Lee. [n.d.] Solid. Retrieved October 25 2022 from https:\/\/solidproject.org\/about"},{"key":"e_1_3_1_26_2","unstructured":"Web3 foundation. 2022. Web3.0 technology stack. https:\/\/web3.foundation\/abou"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2022.3181504"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.2200227"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1038\/nbt1206-1565"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2012.16"},{"key":"e_1_3_1_31_2","first-page":"713","article-title":"Na\u00efve Bayes.","volume":"15","author":"Webb Geoffrey I.","year":"2010","unstructured":"Geoffrey I. Webb, Eamonn Keogh, and Risto Miikkulainen. 2010. Na\u00efve Bayes. Encyclopedia of Machine Learning 15 (2010), 713\u2013714.","journal-title":"Encyclopedia of Machine Learning"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2017.12.002"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1002\/cem.873"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.17849\/insm-47-01-31-39.1"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3046876"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2845-6_6"},{"key":"e_1_3_1_37_2","unstructured":"Alexander Mordvintsev Christopher Olah and Mike Tyka. 2015. Inceptionism: Going Deeper into Neural Networks. https:\/\/research.googleblog.com\/2015\/06\/inceptionism-going-deeper-into-neural.html"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.265"},{"key":"e_1_3_1_39_2","article-title":"An AI based super nodes selection algorithm in blockchain networks","author":"Chen Jianwen","year":"2018","unstructured":"Jianwen Chen, Kai Duan, Rumin Zhang, Liaoyuan Zeng, and Wenyi Wang. 2018. An AI based super nodes selection algorithm in blockchain networks. arXiv preprint arXiv:1808.00216 (2018).","journal-title":"arXiv preprint arXiv:1808.00216"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP48831.2020.9287133"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.3390\/s21030710"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.4249\/scholarpedia.1888"},{"key":"e_1_3_1_43_2","article-title":"A deep learning framework for predicting digital asset price movement from trade-by-trade data","author":"Zhao Qi","year":"2020","unstructured":"Qi Zhao. 2020. A deep learning framework for predicting digital asset price movement from trade-by-trade data. arXiv preprint arXiv:2010.07404 (2020).","journal-title":"arXiv preprint arXiv:2010.07404"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2927707"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-12709-2"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1186\/s40649-019-0069-y"},{"key":"e_1_3_1_47_2","article-title":"Identity inference on blockchain using graph neural network","volume":"2104","author":"Shen Jie","year":"2021","unstructured":"Jie Shen, Jiajun Zhou, Yunyi Xie, Shanqing Yu, and Qi Xuan. 2021. Identity inference on blockchain using graph neural network. CoRR abs\/2104.06559 (2021). https:\/\/arxiv.org\/abs\/2104.06559","journal-title":"CoRR"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/3398071"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3046876"},{"key":"e_1_3_1_50_2","article-title":"Web3-based decentralized autonomous organizations and operations: Architectures, models, and mechanisms","author":"Qin Rui","year":"2022","unstructured":"Rui Qin, Wenwen Ding, et\u00a0al. 2022. Web3-based decentralized autonomous organizations and operations: Architectures, models, and mechanisms. IEEE Transactions on Systems, Man, and Cybernetics: Systems 53, 4 (2022), 2073\u20132082.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"key":"e_1_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/DAPPCON.2019.00023"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013824"},{"key":"e_1_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2019.2918307"},{"key":"e_1_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3328526.3329589"},{"key":"e_1_3_1_55_2","article-title":"A privacy-preserving data storage and service framework based on deep learning and blockchain for construction workers\u2019 wearable IoT sensors","author":"Zhou Xiaoshan","year":"2022","unstructured":"Xiaoshan Zhou and Pin-Chao Liao. 2022. A privacy-preserving data storage and service framework based on deep learning and blockchain for construction workers\u2019 wearable IoT sensors. arXiv preprint arXiv:2211.10713 (2022).","journal-title":"arXiv preprint arXiv:2211.10713"},{"key":"e_1_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.3390\/s22020528"},{"key":"e_1_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3047105"},{"key":"e_1_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.3390\/fintech1030018"},{"key":"e_1_3_1_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2911512"},{"key":"e_1_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2927314"},{"key":"e_1_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44041-1_70"},{"key":"e_1_3_1_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9206701"},{"key":"e_1_3_1_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9534324"},{"key":"e_1_3_1_64_2","article-title":"Towards safer smart contracts: A sequence learning approach to detecting vulnerabilities","volume":"1811","author":"Tann Wesley Joon-Wie","year":"2018","unstructured":"Wesley Joon-Wie Tann, Xing Jie Han, Sourav Sen Gupta, and Yew-Soon Ong. 2018. Towards safer smart contracts: A sequence learning approach to detecting vulnerabilities. CoRR abs\/1811.06632 (2018). arXiv:1811.06632http:\/\/arxiv.org\/abs\/1811.06632","journal-title":"CoRR"},{"key":"e_1_3_1_65_2","unstructured":"Yuan Zhuang Zhenguang Liu Peng Qian Qi Liu Xiang Wang and Qinming He. 2021. Smart contract vulnerability detection using graph neural networks. InInternational Joint Conference on Artificial Intelligence (IJCAI\u201920). Article 454 8 pages."},{"key":"e_1_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500397"},{"key":"e_1_3_1_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/CITS55221.2022.9832978"},{"key":"e_1_3_1_68_2","doi-asserted-by":"publisher","unstructured":"Kuan-Ting Lai Chia-Chih Lin Chun-Yao Kang Mei-Enn Liao and Ming-Syan Chen. 2018. VIVID: Virtual environment for visual deep learning. In Proceedings of the 26th ACM International Conference on Multimedia. 1356\u20131359. DOI:10.1145\/3240508.3243653","DOI":"10.1145\/3240508.3243653"},{"key":"e_1_3_1_69_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC47757.2020.9049708"},{"key":"e_1_3_1_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2018.8644088"},{"key":"e_1_3_1_71_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2890203"},{"key":"e_1_3_1_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3213360"},{"key":"e_1_3_1_73_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2951169"},{"key":"e_1_3_1_74_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3030080"},{"key":"e_1_3_1_75_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3006896"},{"key":"e_1_3_1_76_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-06791-4_46"},{"key":"e_1_3_1_77_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3014370"},{"key":"e_1_3_1_78_2","article-title":"Distributed transmission control for wireless networks using multi-agent reinforcement learning","volume":"2205","author":"Farquhar Collin","year":"2022","unstructured":"Collin Farquhar, Prem Sagar Pattanshetty Vasanth Kumar, Anu Jagannath, and Jithin Jagannath. 2022. Distributed transmission control for wireless networks using multi-agent reinforcement learning. CoRR abs\/2205.06800 (2022).","journal-title":"CoRR"},{"key":"e_1_3_1_79_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683228"},{"key":"e_1_3_1_80_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03399-w"},{"key":"e_1_3_1_81_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3152188"},{"key":"e_1_3_1_82_2","article-title":"Social welfare maximization for collaborative edge computing: A deep reinforcement learning-based approach","volume":"2211","author":"He Xingqiu","year":"2022","unstructured":"Xingqiu He, Yuhang Shen, Hongxi Zhu, Sheng Wang, Chaoqun You, and Tony Q. S. Quek. 2022. Social welfare maximization for collaborative edge computing: A deep reinforcement learning-based approach. CoRR abs\/2211.06861 (2022).","journal-title":"CoRR"},{"key":"e_1_3_1_83_2","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2022.3156019"},{"key":"e_1_3_1_84_2","article-title":"Blockchain assisted decentralized federated learning (BLADE-FL): Performance analysis and resource allocation","volume":"2101","author":"Li Jun","year":"2021","unstructured":"Jun Li, Yumeng Shao, Kang Wei, Ming Ding, Chuan Ma, Long Shi, Zhu Han, and H. Vincent Poor. 2021. Blockchain assisted decentralized federated learning (BLADE-FL): Performance analysis and resource allocation. CoRR abs\/2101.06905 (2021).","journal-title":"CoRR"},{"key":"e_1_3_1_85_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3014896"},{"key":"e_1_3_1_86_2","article-title":"A unified blockchain-semantic framework for wireless edge intelligence enabled web 3.0","author":"Lin Yijing","year":"2022","unstructured":"Yijing Lin, Zhipeng Gao, Hongyang Du, Dusit Niyato, Jiawen Kang, Ruilong Deng, and Xuemin Sherman Shen. 2022. A unified blockchain-semantic framework for wireless edge intelligence enabled web 3.0. arXiv preprint arXiv:2210.15130 (2022).","journal-title":"arXiv preprint arXiv:2210.15130"},{"key":"e_1_3_1_87_2","doi-asserted-by":"publisher","DOI":"10.1109\/OJVT.2020.2965100"},{"key":"e_1_3_1_88_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3041405"},{"key":"e_1_3_1_89_2","article-title":"Selecting reliable blockchain peers via hybrid blockchain reliability prediction","volume":"1910","author":"Zheng Peilin","year":"2019","unstructured":"Peilin Zheng, Zibin Zheng, and Liang Chen. 2019. Selecting reliable blockchain peers via hybrid blockchain reliability prediction. CoRR abs\/1910.14614 (2019). arXiv:1910.14614http:\/\/arxiv.org\/abs\/1910.14614","journal-title":"CoRR"},{"key":"e_1_3_1_90_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.1900598"},{"key":"e_1_3_1_91_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30637-2_34"},{"key":"e_1_3_1_92_2","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272727"},{"key":"e_1_3_1_93_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2913234"},{"key":"e_1_3_1_94_2","unstructured":"The World Wide Web Consortium. [n.d.] Decentralized identifiers (DIDs) v1.0. Retrieved July 19 2022 from https:\/\/www.w3.org\/TR\/did-core\/"},{"key":"e_1_3_1_95_2","article-title":"Decentralized society: Finding web3\u2019s soul","author":"Weyl E Glen","year":"2022","unstructured":"E Glen Weyl, Puja Ohlhaver, and Vitalik Buterin. 2022. Decentralized society: Finding web3\u2019s soul. Available at SSRN 4105763 (2022).","journal-title":"Available at SSRN 4105763"},{"key":"e_1_3_1_96_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61545-5"},{"key":"e_1_3_1_97_2","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2018.00026"},{"key":"e_1_3_1_98_2","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2017.147"},{"key":"e_1_3_1_99_2","article-title":"Digital twin: Acquiring high-fidelity 3D avatar from a single image","author":"Wang Ruizhe","year":"2019","unstructured":"Ruizhe Wang, Chih-Fan Chen, Hao Peng, Xudong Liu, Oliver Liu, and Xin Li. 2019. Digital twin: Acquiring high-fidelity 3D avatar from a single image. arXiv preprint arXiv:1912.03455 (2019).","journal-title":"arXiv preprint arXiv:1912.03455"},{"key":"e_1_3_1_100_2","doi-asserted-by":"publisher","DOI":"10.1007\/s41064-020-00092-2"},{"key":"e_1_3_1_101_2","doi-asserted-by":"publisher","DOI":"10.1080\/0951192X.2020.1757155"},{"key":"e_1_3_1_102_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"e_1_3_1_103_2","unstructured":"G. Goh A. Ramesh M. Pavlov and S. Gray. [n.d.] DALL\u00b7E: Creating images from text. Retrieved January 25 2021 from https:\/\/openai.com\/blog\/dall-e\/"},{"key":"e_1_3_1_104_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2611487"},{"key":"e_1_3_1_105_2","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.2018.1129"},{"key":"e_1_3_1_106_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3135829"},{"key":"e_1_3_1_107_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"e_1_3_1_108_2","article-title":"Generating sequences with recurrent neural networks","author":"Graves Alex","year":"2013","unstructured":"Alex Graves. 2013. Generating sequences with recurrent neural networks. arXiv preprint arXiv:1308.0850 (2013).","journal-title":"arXiv preprint arXiv:1308.0850"},{"key":"e_1_3_1_109_2","doi-asserted-by":"publisher","DOI":"10.1145\/3297156.3297267"},{"key":"e_1_3_1_110_2","article-title":"Generating sentences from a continuous space","author":"Bowman Samuel R.","year":"2015","unstructured":"Samuel R. Bowman, Luke Vilnis, Oriol Vinyals, Andrew M. Dai, Rafal Jozefowicz, and Samy Bengio. 2015. Generating sentences from a continuous space. arXiv preprint arXiv:1511.06349 (2015).","journal-title":"arXiv preprint arXiv:1511.06349"},{"key":"e_1_3_1_111_2","unstructured":"OpenAI. [n.d.]Introducing ChatGPT. Retrieved November 30 2022 from https:\/\/openai.com\/blog\/chatgpt\/"},{"key":"e_1_3_1_112_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2779181"},{"key":"e_1_3_1_113_2","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM59352.2023.10327850"},{"key":"e_1_3_1_114_2","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4433"},{"key":"e_1_3_1_115_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3178970"},{"key":"e_1_3_1_116_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155268"},{"key":"e_1_3_1_117_2","article-title":"FAIR-BFL: Flexible and incentive redesign for blockchain-based federated learning","author":"Xu Rongxin","year":"2022","unstructured":"Rongxin Xu, Shiva Raj Pokhrel, Qiujun Lan, and Gang Li. 2022. FAIR-BFL: Flexible and incentive redesign for blockchain-based federated learning. arXiv preprint arXiv:2206.12899 (2022).","journal-title":"arXiv preprint arXiv:2206.12899"},{"key":"e_1_3_1_118_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-00129-1_9"},{"key":"e_1_3_1_119_2","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186046"},{"key":"e_1_3_1_120_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2020.3016821"},{"key":"e_1_3_1_121_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3213347"},{"key":"e_1_3_1_122_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2994639"},{"key":"e_1_3_1_123_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2967772"},{"key":"e_1_3_1_124_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9413377"},{"key":"e_1_3_1_125_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9534227"},{"key":"e_1_3_1_126_2","doi-asserted-by":"publisher","DOI":"10.1145\/3366424.3382711"},{"key":"e_1_3_1_127_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01475"},{"key":"e_1_3_1_128_2","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413570"},{"key":"e_1_3_1_129_2","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/102"},{"key":"e_1_3_1_130_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58577-8_20"},{"key":"e_1_3_1_131_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01483"},{"key":"e_1_3_1_132_2","article-title":"Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics","volume":"1908","author":"Weber Mark","year":"2019","unstructured":"Mark Weber, Giacomo Domeniconi, Jie Chen, Daniel Karl I. Weidele, Claudio Bellei, Tom Robinson, and Charles E. Leiserson. 2019. Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics. CoRR abs\/1908.02591 (2019). http:\/\/arxiv.org\/abs\/1908.02591","journal-title":"CoRR"},{"key":"e_1_3_1_133_2","article-title":"Identifying illicit accounts in large scale e-payment networks: A Graph Representation Learning Approach","volume":"1906","author":"Tam Da Sun Handason","year":"2019","unstructured":"Da Sun Handason Tam, Wing Cheong Lau, Bin Hu, Qiufang Ying, Dah Ming Chiu, and Hong Liu. 2019. Identifying illicit accounts in large scale e-payment networks: A Graph Representation Learning Approach. CoRR abs\/1906.05546 (2019). http:\/\/arxiv.org\/abs\/1906.05546","journal-title":"CoRR"},{"key":"e_1_3_1_134_2","first-page":"1","volume-title":"29th IEEE\/ACM International Symposium on Quality of Service (IWQOS\u201921)","author":"Shen Meng","unstructured":"Meng Shen, Zhenbo Gao, Liehuang Zhu, and Ke Xu. Efficient fine-grained website fingerprinting via encrypted traffic analysis with deep learning. In 29th IEEE\/ACM International Symposium on Quality of Service (IWQOS\u201921). IEEE, 1\u201310."},{"key":"e_1_3_1_135_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2692682"},{"key":"e_1_3_1_136_2","first-page":"1","volume-title":"28th IEEE\/ACM International Symposium on Quality of Service (IWQoS\u201920)","author":"Shen Meng","unstructured":"Meng Shen, Jinpeng Zhang, Ke Xu, Liehuang Zhu, Jiangchuan Liu, and Xiaojiang Du. DeepQoE: Real-time measurement of video QoE from encrypted traffic with deep learning. In 28th IEEE\/ACM International Symposium on Quality of Service (IWQoS\u201920). IEEE, 1\u201310."},{"key":"e_1_3_1_137_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488807"},{"key":"e_1_3_1_138_2","first-page":"4561","volume-title":"31st USENIX Security Symposium (USENIX Security\u201922)","author":"Yuan Xiaoyong","year":"2022","unstructured":"Xiaoyong Yuan and Lan Zhang. 2022. Membership inference attacks and defenses in neural network pruning. In 31st USENIX Security Symposium (USENIX Security\u201922). 4561\u20134578."},{"key":"e_1_3_1_139_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3141582"},{"key":"e_1_3_1_140_2","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449813"},{"key":"e_1_3_1_141_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00919"},{"key":"e_1_3_1_142_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3297369"},{"key":"e_1_3_1_143_2","first-page":"1318","volume-title":"2011 IEEE 3rd International Conference on Privacy, Security, Risk and Trust (PASSAT\u201911) and 2011 IEEE 3rd International Conference on Social Computing (SocialCom\u201911)","author":"Reid Fergal","unstructured":"Fergal Reid and Martin Harrigan. An analysis of anonymity in the bitcoin system. In 2011 IEEE 3rd International Conference on Privacy, Security, Risk and Trust (PASSAT\u201911) and 2011 IEEE 3rd International Conference on Social Computing (SocialCom\u201911). IEEE Computer Society, 1318\u20131326."},{"key":"e_1_3_1_144_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3208471"},{"key":"e_1_3_1_145_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2021.3049278"},{"key":"e_1_3_1_146_2","unstructured":"chainalysis. [n.d.]https:\/\/www.chainalysis.com\/"},{"key":"e_1_3_1_147_2","unstructured":"augur. [n.d.]https:\/\/augur.net\/"},{"key":"e_1_3_1_148_2","doi-asserted-by":"publisher","DOI":"10.1145\/2134203.2134206"},{"key":"e_1_3_1_149_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519779"},{"key":"e_1_3_1_150_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3013272"},{"key":"e_1_3_1_151_2","unstructured":"Aiarena. 2022. https:\/\/docs.aiarena.io\/"},{"key":"e_1_3_1_152_2","unstructured":"Chaos box. 2022. https:\/\/rct.ai\/zh-hans\/"},{"key":"e_1_3_1_153_2","doi-asserted-by":"publisher","DOI":"10.1145\/1178823.1178853"},{"key":"e_1_3_1_154_2","doi-asserted-by":"crossref","unstructured":"Y. Meng Y. Zhan J. Li S. Du H. Zhu and X. Shen. 2023. De-anonymization attacks on metaverse (2023).","DOI":"10.1109\/INFOCOM53939.2023.10229062"},{"key":"e_1_3_1_155_2","doi-asserted-by":"crossref","unstructured":"medibloc. 2023. IEEE INFOCOM 2023-IEEE Conference on Computer Communications. IEEE 1\u201310. https:\/\/medibloc.com\/","DOI":"10.1109\/INFOCOMWKSHPS57453.2023.10226177"},{"key":"e_1_3_1_156_2","doi-asserted-by":"publisher","DOI":"10.18632\/oncotarget.22345"},{"key":"e_1_3_1_157_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41569-019-0294-y"},{"key":"e_1_3_1_158_2","doi-asserted-by":"publisher","DOI":"10.30953\/bhty.v4.176"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3657284","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3657284","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:39Z","timestamp":1750295859000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3657284"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,14]]},"references-count":157,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2024,10,31]]}},"alternative-id":["10.1145\/3657284"],"URL":"https:\/\/doi.org\/10.1145\/3657284","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,14]]},"assertion":[{"value":"2023-03-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-03-31","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-05-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}