Towards Risk‐Free Trustworthy Artificial Intelligence: Significance and Requirements
Given the tremendous potential and influence of artificial intelligence (AI) and algorithmic
decision‐making (DM), these systems have found wide‐ranging applications across diverse …
decision‐making (DM), these systems have found wide‐ranging applications across diverse …
On identity, transaction, and smart contract privacy on permissioned and permissionless blockchain: A comprehensive survey
Blockchain is a decentralized distributed ledger that combines multiple technologies,
including chain data structures, P2P networks, consensus algorithms, cryptography, and …
including chain data structures, P2P networks, consensus algorithms, cryptography, and …
Gtxchain: A secure iot smart blockchain architecture based on graph neural network
With the expansion of scale, the Internet of Things (IoT) suffers more and more security
threats, and vulnerability and sensitivity to attacks are also increasing. As a distributed and …
threats, and vulnerability and sensitivity to attacks are also increasing. As a distributed and …
A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control
J Li, D Han, Z Wu, J Wang, KC Li… - Future Generation …, 2023 - Elsevier
With the increasing sales of the medical device market, the medical incidents caused by
passive medical devices are increasing, which needs to be solved from the medical device …
passive medical devices are increasing, which needs to be solved from the medical device …
A systematic review of consensus mechanisms in blockchain
Since the birth of Bitcoin, blockchain has shifted from a critical cryptocurrency technology to
an enabling technology. Due to its immutability and trustworthiness, blockchain has …
an enabling technology. Due to its immutability and trustworthiness, blockchain has …
LMCA: a lightweight anomaly network traffic detection model integrating adjusted mobilenet and coordinate attention mechanism for IoT
As widely known, most of the Internet of Things (IoT) devices own small storage and
constrained computing power, and hence, their poor security evaluation capabilities make …
constrained computing power, and hence, their poor security evaluation capabilities make …
Modeling and analysis of port supply chain system based on Fabric blockchain
With the development of international trade, the core position of port transportation
progressively emerges. However, most current port supply chain systems adopt a …
progressively emerges. However, most current port supply chain systems adopt a …
An architecture for managing data privacy in healthcare with blockchain
With the fast development of blockchain technology in the latest years, its application in
scenarios that require privacy, such as health area, have become encouraged and widely …
scenarios that require privacy, such as health area, have become encouraged and widely …
Blockchains for artificial intelligence of things: a comprehensive survey
With the rapid advances in information and communication technologies, the Internet of
Things (IoT) has become large and complex, bearing tremendous amounts of data and …
Things (IoT) has become large and complex, bearing tremendous amounts of data and …
A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption
The port supply chain can provide strong data support for smart port decision-making.
However, the traditional port supply chain suffers from poor flexibility of centralized authority …
However, the traditional port supply chain suffers from poor flexibility of centralized authority …