Abstract
Web 3.0 is the next generation of the Internet built on decentralized technologies such as blockchain and cryptography. It is born to solve the problems faced by the previous generation of the Internet such as imbalanced distribution of interests, monopoly of platform resources, and leakage of personal privacy. In this survey, we discuss the latest development status of Web 3.0 and the application of emerging AI technologies in it. First, we investigate the current successful practices of Web 3.0 and various components in the current Web 3.0 ecosystem and thus propose the hierarchical architecture of the Web 3.0 ecosystem from the perspective of application scenarios. The architecture we proposed contains four layers: data management, value circulation, ecological governance, and application scenarios. We dive into the current state of development and the main challenges and issues present in each layer. In this context, we find that AI technology will have great potential. We first briefly introduce the role that artificial intelligence technology may play in the development of Web 3.0. Then, we conduct an in-depth analysis of the current application status of artificial intelligence technology in the four layers of Web 3.0 and provide some insights into its potential future development directions.
- [1] . Web3: In a nutshell. [n.d.] Retrieved September 10, 2021 from https://eshita.mirror.xyz/H5bNIXATsWUv_QbbEz6lckYcgAa2rhXEPDRkecOlCOIGoogle Scholar
- [2] . 2022. Web3. 0: A new generation of Internet that is approaching gradually. China Finance.Google Scholar
- [3] . 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review.Google Scholar
- [4] . 2014. A next-generation smart contract and decentralized application platform. White Paper 3, 37 (2014), 2–1.Google Scholar
- [5] . 2017. Eos-an introduction. White Paper. https://whitepaperdatabase.com/eos-whitepaperGoogle Scholar
- [6] nostr. [n.d.] https://nostr.com/Google Scholar
- [7] . 2021. AttM-CNN: Attention and metric learning based CNN for pornography, age and Child Sexual Abuse (CSA) Detection in images. Neurocomputing 445 (2021), 81–104.Google ScholarCross Ref
- [8] . 2018. Anticipating cryptocurrency prices using machine learning. Complexity 2018 (2018), 1–16.Google ScholarDigital Library
- [9] . 2021. Learning transferable visual models from natural language supervision. In International Conference on Machine Learning. PMLR, 8748–8763.Google Scholar
- [10] . 2019. Plug and play language models: A simple approach to controlled text generation. arXiv preprint arXiv:1912.02164 (2019).Google Scholar
- [11] . 2018. Story scrambler-automatic text generation using word level RNN-LSTM. International Journal of Information Technology and Computer Science (IJITCS) 10, 6 (2018), 44–53.Google ScholarCross Ref
- [12] . 2020. An attention-based unsupervised adversarial model for movie review spam detection. IEEE Transactions on Multimedia 23 (2020), 784–796.Google ScholarCross Ref
- [13] . 2022. A survey on metaverse: Fundamentals, security, and privacy. IEEE Communications Surveys & Tutorials 25, 1 (2022), 319–352.Google Scholar
- [14] . 2022. Fusing blockchain and AI with metaverse: A survey. IEEE Open Journal of the Computer Society 3 (2022), 122–136.Google ScholarCross Ref
- [15] . 2023. Artificial intelligence for the metaverse: A survey. Engineering Applications of Artificial Intelligence 117 (2023), 105581.Google ScholarDigital Library
- [16] . 2016. A brief survey of cryptocurrency systems. In 2016 14th Annual Conference on Privacy, Security and Trust (PST’16). IEEE, 745–752.Google ScholarCross Ref
- [17] . 2021. Blockchain for decentralization of internet: prospects, trends, and challenges. Cluster Computing 24, 4 (2021), 2841–2866.Google ScholarDigital Library
- [18] . 2019. A survey on blockchain-based internet service architecture: Requirements, challenges, trends, and future. IEEE Access 7 (2019), 75845–75872.Google ScholarCross Ref
- [19] . 2020. A survey on blockchain-based identity management and decentralized privacy for personal data. In 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS’20). IEEE, 97–101.Google ScholarCross Ref
- [20] . 1989. Tim berners-lee. (1989).Google Scholar
- [21] . 1999. HTML 4.01 Specification. W3C Recommendation 24 (1999).Google Scholar
- [22] . 1999. Hypertext Transfer Protocol–HTTP/1.1.
Technical Report .Google ScholarDigital Library - [23] . 2013. Web 2.0: The origin of the word that has changed the way we understand public relations. In Barcelona International PR Conference.Google Scholar
- [24] . [n.d.] Solid. Retrieved October 25, 2022 from https://solidproject.org/aboutGoogle Scholar
- [25] . 2022. Web3.0 technology stack. https://web3.foundation/abouGoogle Scholar
- [26] . 2022. Decentralized ai: Edge intelligence and smart blockchain, metaverse, web3, and desci. IEEE Intelligent Systems 37, 3 (2022), 6–19.Google ScholarCross Ref
- [27] . 2022. Collaboration-enabled intelligent internet architecture: Opportunities and challenges. IEEE Network 36, 5 (2022), 98–105.Google ScholarCross Ref
- [28] . 2006. What is a support vector machine? Nature Biotechnology 24, 12 (2006), 1565–1567.Google ScholarCross Ref
- [29] . 2012. Face recognition in the virtual world: recognizing avatar faces. In 2012 11th International Conference on Machine Learning and Applications, Vol. 1. IEEE, 40–45.Google ScholarDigital Library
- [30] . 2010. Naïve Bayes. Encyclopedia of Machine Learning 15 (2010), 713–714.Google Scholar
- [31] . 2018. Optimal pricing in e-commerce based on sparse and noisy data. Decision Support Systems 106 (2018), 53–63.Google ScholarCross Ref
- [32] . 2004. An introduction to decision tree modeling. Journal of Chemometrics: A Journal of the Chemometrics Society 18, 6 (2004), 275–285.Google ScholarCross Ref
- [33] . 2017. Random forest. Journal of Insurance Medicine 47, 1 (2017), 31–39.Google ScholarCross Ref
- [34] . 2021. Fine-grained webpage fingerprinting using only packet length information of encrypted traffic. IEEE Transactions on Information Forensics and Security 16 (2021), 2046–2059.Google ScholarCross Ref
- [35] . 2017. Convolutional neural network. In MATLAB Deep Learning. Springer, 121–147.Google ScholarCross Ref
- [36] . 2015. Inceptionism: Going Deeper into Neural Networks. https://research.googleblog.com/2015/06/inceptionism-going-deeper-into-neural.htmlGoogle Scholar
- [37] . 2016. Image style transfer using convolutional neural networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2414–2423.Google ScholarCross Ref
- [38] . 2018. An AI based super nodes selection algorithm in blockchain networks. arXiv preprint arXiv:1808.00216 (2018).Google Scholar
- [39] . 2020. Spectrogram-based classification of spoken foul language using deep CNN. In 2020 IEEE 22nd International Workshop on Multimedia Signal Processing (MMSP’20). IEEE, 1–6.Google ScholarCross Ref
- [40] . 2021. Design and implementation of fast spoken foul language recognition with different end-to-end deep neural network architectures. Sensors 21, 3 (2021), 710.Google ScholarCross Ref
- [41] . 2013. Recurrent neural networks. Scholarpedia 8, 2 (2013), 1888.Google ScholarCross Ref
- [42] . 2020. A deep learning framework for predicting digital asset price movement from trade-by-trade data. arXiv preprint arXiv:2010.07404 (2020).Google Scholar
- [43] . 2019. Toward characterizing blockchain-based cryptocurrencies for highly accurate predictions. IEEE Systems Journal 14, 1 (2019), 321–332.Google ScholarCross Ref
- [44] . 2022. A multi-modal approach to detect inappropriate cartoon video contents using deep learning networks. Multimedia Tools and Applications 81, 12 (2022), 16881–16900.Google ScholarDigital Library
- [45] . 2019. Graph convolutional networks: A comprehensive review. Computational Social Networks 6, 1 (2019), 1–23.Google ScholarCross Ref
- [46] . 2021. Identity inference on blockchain using graph neural network. CoRR abs/2104.06559 (2021). https://arxiv.org/abs/2104.06559Google Scholar
- [47] . 2021. Phishing scams detection in ethereum transaction network. ACM Transactions on Internet Technology 21, 1 (2021), 10:1–10:16.Google ScholarDigital Library
- [48] . 2021. Fine-grained webpage fingerprinting using only packet length information of encrypted traffic. IEEE Transactions on Information Forensics and Security 16 (2021), 2046–2059.Google ScholarCross Ref
- [49] . 2022. Web3-based decentralized autonomous organizations and operations: Architectures, models, and mechanisms. IEEE Transactions on Systems, Man, and Cybernetics: Systems 53, 4 (2022), 2073–2082.Google Scholar
- [50] . 2019. Proof-of-learning: A blockchain consensus mechanism based on machine learning competitions. In 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON’19). IEEE, 119–124.Google ScholarCross Ref
- [51] . 2019. Ai-enabled blockchain: An outlier-aware consensus protocol for blockchain-based IoT networks. In 2019 IEEE Global Communications Conference (GLOBECOM’19). IEEE, 1–6.Google ScholarDigital Library
- [52] . 2019. Continuous authentication of smartphones based on application usage. IEEE Transactions on Biometrics, Behavior, and Identity Science 1, 3 (2019), 165–180.Google ScholarCross Ref
- [53] . 2019. A marketplace for data: An algorithmic solution. In Proceedings of the 2019 ACM Conference on Economics and Computation. 701–726.Google ScholarDigital Library
- [54] . 2022. A privacy-preserving data storage and service framework based on deep learning and blockchain for construction workers’ wearable IoT sensors. arXiv preprint arXiv:2211.10713 (2022).Google Scholar
- [55] . 2022. Deep learning based homomorphic secure search-able encryption for keyword search in blockchain healthcare system: A novel approach to cryptography. Sensors 22, 2 (2022), 528.Google ScholarCross Ref
- [56] . 2020. An incentive mechanism for privacy-preserving crowdsensing via deep reinforcement learning. IEEE Internet of Things Journal 8, 10 (2020), 8616–8631.Google ScholarCross Ref
- [57] . 2022. Some very simple economics of web3 and the metaverse. FinTech 1, 3 (2022), 225–234.Google ScholarCross Ref
- [58] . 2019. Incentive mechanism for multiple cooperative tasks with compatible users in mobile crowd sensing via online communities. IEEE Transactions on Mobile Computing 19, 7 (2019), 1618–1633.Google ScholarCross Ref
- [59] . 2019. Free market of multi-leader multi-follower mobile crowdsensing: An incentive mechanism design by deep reinforcement learning. IEEE Transactions on Mobile Computing 19, 10 (2019), 2316–2329.Google ScholarCross Ref
- [60] . 2020. Incentive mechanism for mobile crowdsensing in spatial information prediction using machine learning. In International Conference on Advanced Information Networking and Applications. Springer, 792–803.Google ScholarCross Ref
- [61] . 2020. PEDA 376K: A novel dataset for deep-learning based porn-detectors. In 2020 International Joint Conference on Neural Networks (IJCNN’20). IEEE, 1–8.Google ScholarCross Ref
- [62] . 2021. DeeSCVHunter: A deep learning-based framework for smart contract vulnerability detection. In 2021 International Joint Conference on Neural Networks (IJCNN’21). 1–8.
DOI: Google ScholarCross Ref - [63] . 2018. Towards safer smart contracts: A sequence learning approach to detecting vulnerabilities. CoRR abs/1811.06632 (2018).
arXiv:1811.06632 http://arxiv.org/abs/1811.06632Google Scholar - [64] . 2021. Smart contract vulnerability detection using graph neural networks. InInternational Joint Conference on Artificial Intelligence (IJCAI’20). Article
454 , 8 pages.Google Scholar - [65] . 2021. MedBlock: An AI-enabled and blockchain-driven medical healthcare system for COVID-19. In IEEE International Conference on Communications (ICC’21). 1–6.
DOI: Google ScholarCross Ref - [66] . 2022. Metaverse assisted telesurgery in healthcare 5.0: An interplay of blockchain and explainable AI. In 2022 International Conference on Computer, Information and Telecommunication Systems (CITS’22). 1–5.
DOI: Google ScholarCross Ref - [67] . 2018. VIVID: Virtual environment for visual deep learning. In Proceedings of the 26th ACM International Conference on Multimedia. 1356–1359.
DOI: Google ScholarDigital Library - [68] . 2020. Federated learning based mobile edge computing for augmented reality applications. In 2020 International Conference on Computing, Networking and Communications (ICNC’20). 767–773.
DOI: Google ScholarCross Ref - [69] . 2018. BHEEM: A blockchain-based framework for securing electronic health records. In 2018 IEEE Globecom Workshops (GC Wkshps’18). 1–6.
DOI: Google ScholarCross Ref - [70] . 2018. Blockchain-enabled data collection and sharing for industrial IoT with deep reinforcement learning. IEEE Transactions on Industrial Informatics 15, 6 (2018), 3516–3526.Google ScholarCross Ref
- [71] . 2022. Incentivizing proof-of-stake blockchain for secured data collection in UAV-assisted IoT: A multi-agent reinforcement learning approach. IEEE Journal on Selected Areas in Communications 40, 12 (2022), 3470–3484.Google ScholarCross Ref
- [72] . 2020. SDN/NFV-empowered future IoV with enhanced communication, computing, and caching. Proceedings of the IEEE 108, 2 (2020), 274–291.Google ScholarCross Ref
- [73] . 2021. A blockchain-enabled energy-efficient data collection system for UAV-assisted IoT. IEEE Internet of Things Journal 8, 4 (2021), 2431–2443.
DOI: Google ScholarCross Ref - [74] . 2021. DQN-based optimization framework for secure sharded blockchain systems. IEEE Internet of Things Journal 8, 2 (2021), 708–722.
DOI: Google ScholarCross Ref - [75] . 2022. Blockchain enable IoT using deep reinforcement learning: A novel architecture to ensure security of data sharing and storage. In International Conference on Artificial Intelligence and Security. Springer, 586–597.Google ScholarDigital Library
- [76] . 2022. CREAT: Blockchain-assisted compression algorithm of federated learning for content caching in edge computing. IEEE Internet of Things Journal 9, 16 (2022), 14151–14161.Google ScholarCross Ref
- [77] . 2022. Distributed transmission control for wireless networks using multi-agent reinforcement learning. CoRR abs/2205.06800 (2022).Google Scholar
- [78] . 2019. Joint transaction transmission and channel selection in cognitive radio based blockchain networks: A deep reinforcement learning approach. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP’19). IEEE, 8409–8413.Google ScholarCross Ref
- [79] . 2022. Privacy preserving personalized blockchain reliability prediction via federated learning in IoT environments. Cluster Computing 25, 4 (2022), 2515–2526.Google ScholarDigital Library
- [80] . 2022. Sharded blockchain for collaborative computing in the internet of things: Combined of dynamic clustering and deep reinforcement learning approach. IEEE Internet of Things Journal 9, 17 (2022), 16494–16509.Google ScholarCross Ref
- [81] . 2022. Social welfare maximization for collaborative edge computing: A deep reinforcement learning-based approach. CoRR abs/2211.06861 (2022).Google Scholar
- [82] . 2022. Optimizing learned Bloom filters: How much should be learned? IEEE Embedded Systems Letters 14, 3 (2022), 123–126.Google ScholarCross Ref
- [83] . 2021. Blockchain assisted decentralized federated learning (BLADE-FL): Performance analysis and resource allocation. CoRR abs/2101.06905 (2021).Google Scholar
- [84] . 2020. Fast adaptive task offloading in edge computing based on meta reinforcement learning. IEEE Transactions on Parallel and Distributed Systems 32, 1 (2020), 242–253.Google ScholarDigital Library
- [85] . 2022. A unified blockchain-semantic framework for wireless edge intelligence enabled web 3.0. arXiv preprint arXiv:2210.15130 (2022).Google Scholar
- [86] . 2020. AI-assisted network-slicing based next-generation wireless networks. IEEE Open Journal of Vehicular Technology 1 (2020), 45–66.Google ScholarCross Ref
- [87] . 2021. Dynamic RAN slicing for service-oriented vehicular networks via constrained learning. IEEE Journal of Selected Areas in Communications 39, 7 (2021), 2076–2089.Google ScholarCross Ref
- [88] . 2019. Selecting reliable blockchain peers via hybrid blockchain reliability prediction. CoRR abs/1910.14614 (2019).
arXiv:1910.14614 http://arxiv.org/abs/1910.14614Google Scholar - [89] . 2021. Blockchain and federated learning for 5G beyond. IEEE Network 35, 1 (2021), 219–225.
DOI: Google ScholarDigital Library - [90] . 2023. Anole: A Lightweight and verifiable learned-based index for time range query on blockchain systems. In Proceedings of the 28th International Conference on Database Systems for Advanced Applications (DASFAA’23), Part I (Lecture Notes in Computer Science), , , , , , , , and (Eds.). Vol. 13943. Springer, 519–534.
DOI: Google ScholarDigital Library - [91] . 2017. Generative convolutional networks for latent fingerprint reconstruction. In 2017 IEEE International Joint Conference on Biometrics (IJCB’17). IEEE, 429–436.Google ScholarDigital Library
- [92] . 2019. Toward more accurate iris recognition using dilated residual features. IEEE Transactions on Information Forensics and Security 14, 12 (2019), 3233–3245.Google ScholarCross Ref
- [93] . [n.d.] Decentralized identifiers (DIDs) v1.0. Retrieved July 19, 2022 from https://www.w3.org/TR/did-core/Google Scholar
- [94] . 2022. Decentralized society: Finding web3’s soul. Available at SSRN 4105763 (2022).Google Scholar
- [95] . 2018. Advanced Biometrics. Springer.Google ScholarCross Ref
- [96] . 2018. Learning to recognize touch gestures: Recurrent vs. convolutional features and dynamic sampling. In 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG’18). IEEE, 114–121.Google ScholarDigital Library
- [97] . 2017. Design of a 3D virtual world to implement a logical access control mechanism based on fingerprints. In 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA’17). 1239–1246.
DOI: Google ScholarCross Ref - [98] . 2019. Digital twin: Acquiring high-fidelity 3D avatar from a single image. arXiv preprint arXiv:1912.03455 (2019).Google Scholar
- [99] . 2020. The digital twin of the city of Zurich for urban planning. PFG–Journal of Photogrammetry, Remote Sensing and Geoinformation Science 88, 1 (2020), 99–112.Google ScholarCross Ref
- [100] . 2021. Digital twins in human understanding: A deep learning-based method to recognize personality traits. International Journal of Computer Integrated Manufacturing 34, 7–8 (2021), 860–873.Google ScholarCross Ref
- [101] . 2019. A style-based generator architecture for generative adversarial networks. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 4401–4410.Google ScholarCross Ref
- [102] . [n.d.] DALL·E: Creating images from text. Retrieved January 25, 2021 from https://openai.com/blog/dall-e/Google Scholar
- [103] . 2016. Dynamic privacy pricing: A multi-armed bandit approach with time-variant rewards. IEEE Transactions on Information Forensics and Security 12, 2 (2016), 271–285.Google ScholarDigital Library
- [104] . 2019. Dynamic online pricing with incomplete information using multiarmed bandit experiments. Marketing Science 38, 2 (2019), 226–252.Google ScholarDigital Library
- [105] . 2021. Holistic network virtualization and pervasive network intelligence for 6G. IEEE Communications Surveys & Tutorials 24, 1 (2021), 1–30.Google ScholarCross Ref
- [106] . 2017. Unpaired image-to-image translation using cycle-consistent adversarial networks. In Proceedings of the IEEE International Conference on Computer Vision. 2223–2232.Google ScholarCross Ref
- [107] . 2013. Generating sequences with recurrent neural networks. arXiv preprint arXiv:1308.0850 (2013).Google Scholar
- [108] . 2018. Combining gated recurrent unit and attention pooling for sentimental classification. In Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence. 99–104.Google ScholarDigital Library
- [109] . 2015. Generating sentences from a continuous space. arXiv preprint arXiv:1511.06349 (2015).Google Scholar
- [110] Introducing ChatGPT. Retrieved November 30, 2022 from https://openai.com/blog/chatgpt/Google Scholar
- [111] . 2017. An empirical study on modeling and prediction of bitcoin prices with Bayesian neural networks based on blockchain information. IEEE Access 6 (2017), 5427–5437.Google ScholarCross Ref
- [112] . 2023. ML-based translation methods for protocols and data formats. In 19th International Conference on Network and Service Management (CNSM’23). IEEE, 1–5.
DOI: Google ScholarCross Ref - [113] . 2022. Enabling machine learning-based side-chaining for improving QoS in blockchain-powered IoT networks. Transactions on Emerging Telecommunications Technologies 33, 4 (2022), e4433.Google ScholarDigital Library
- [114] . 2022. Communication-efficient and cross-chain empowered federated learning for artificial intelligence of things. IEEE Transactions on Network Science and Engineering 9, 5 (2022), 2966–2977.
DOI: Google ScholarCross Ref - [115] . 2020. An incentive mechanism design for efficient edge learning by deep reinforcement learning approach. In IEEE Conference on Computer Communications (IEEE INFOCOM’20). IEEE, 2489–2498.Google ScholarDigital Library
- [116] . 2022. FAIR-BFL: Flexible and incentive redesign for blockchain-based federated learning. arXiv preprint arXiv:2206.12899 (2022).Google Scholar
- [117] . 2022. Fake restaurant review detection using deep neural networks with hybrid feature fusion method. In International Conference on Database Systems for Advanced Applications. Springer, 133–148.Google ScholarDigital Library
- [118] . 2018. Detecting ponzi schemes on ethereum: Towards healthier blockchain technology. In Proceedings of the 2018 World Wide Web Conference on World Wide Web (WWW’18). ACM, 1409–1418.Google ScholarDigital Library
- [119] . 2022. Who are the phishers? Phishing scam detection on ethereum via network embedding. IEEE Transactions on Systems, Man, and Cybernetics Systems 52, 2 (2022), 1156–1166.Google ScholarCross Ref
- [120] . 2022. A platform-free proof of federated learning consensus mechanism for sustainable blockchains. IEEE Journal on Selected Areas in Communications 40, 12 (2022), 3305–3324.Google ScholarCross Ref
- [121] . 2020. Toward an automated auction framework for wireless federated learning services market. IEEE Transactions on Mobile Computing 20, 10 (2020), 3034–3048.Google ScholarDigital Library
- [122] . 2020. A learning-based incentive mechanism for federated learning. IEEE Internet of Things Journal 7, 7 (2020), 6360–6368.Google ScholarCross Ref
- [123] . 2021. Efficient client contribution evaluation for horizontal federated learning. In 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP’21). IEEE, 3060–3064.Google ScholarCross Ref
- [124] . 2021. On-device content moderation. In 2021 International Joint Conference on Neural Networks (IJCNN’21). IEEE, 1–7.Google ScholarCross Ref
- [125] . 2020. Fighting against deepfake: Patch&pair convolutional neural networks (PPCNN). In Companion Proceedings of the Web Conference 2020. 88–89.Google ScholarDigital Library
- [126] . 2021. Learning self-consistency for deepfake detection. In Proceedings of the IEEE/CVF International Conference on Computer Vision. 15023–15033.Google ScholarCross Ref
- [127] . 2020. Emotions don’t lie: An audio-visual deepfake detection method using affective cues. In Proceedings of the 28th ACM International Conference on Multimedia. 2823–2832.Google ScholarDigital Library
- [128] . 2021. Dynamic inconsistency-aware deepfake video detection. In IJCAI.Google ScholarCross Ref
- [129] . 2020. Not only look, but also listen: Learning multimodal violence detection under weak supervision. In European Conference on Computer Vision. Springer, 322–339.Google ScholarDigital Library
- [130] . 2021. Id-reveal: Identity-aware deepfake video detection. In Proceedings of the IEEE/CVF International Conference on Computer Vision. 15108–15117.Google ScholarCross Ref
- [131] . 2019. Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics. CoRR abs/1908.02591 (2019). http://arxiv.org/abs/1908.02591Google Scholar
- [132] . 2019. Identifying illicit accounts in large scale e-payment networks: A Graph Representation Learning Approach. CoRR abs/1906.05546 (2019). http://arxiv.org/abs/1906.05546Google Scholar
- [133] . Efficient fine-grained website fingerprinting via encrypted traffic analysis with deep learning. In 29th IEEE/ACM International Symposium on Quality of Service (IWQOS’21). IEEE, 1–10.Google Scholar
- [134] . 2017. Classification of encrypted traffic with second-order Markov chains and application attribute bigrams. IEEE Transactions on Information Forensics and Security 12, 8 (2017), 1830–1843.
DOI: Google ScholarDigital Library - [135] . DeepQoE: Real-time measurement of video QoE from encrypted traffic with deep learning. In 28th IEEE/ACM International Symposium on Quality of Service (IWQoS’20). IEEE, 1–10.Google Scholar
- [136] . 2021. Fedserving: A federated prediction serving framework based on incentive mechanism. In IEEE Conference on Computer Communications (IEEE INFOCOM’21). IEEE, 1–10.Google ScholarDigital Library
- [137] . 2022. Membership inference attacks and defenses in neural network pruning. In 31st USENIX Security Symposium (USENIX Security’22). 4561–4578.Google Scholar
- [138] . 2022. PPQC: A blockchain-based privacy-preserving quality control mechanism in crowdsensing applications. IEEE/ACM Transactions on Networking 30, 3 (2022), 1352–1367.Google ScholarDigital Library
- [139] . 2021. Graph embedding for recommendation against attribute inference attacks. In Proceedings of the Web Conference 2021. 3002–3014.Google ScholarDigital Library
- [140] . 2021. Soteria: Provable defense against privacy leakage in federated learning from representation perspective. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 9311–9319.Google ScholarCross Ref
- [141] . 2023. FedDef: Defense against gradient leakage in federated learning-based network intrusion detection systems. IEEE Transactions on Information Forensics and Security 18 (2023), 4561–4576.Google ScholarDigital Library
- [142] . An analysis of anonymity in the bitcoin system. In 2011 IEEE 3rd International Conference on Privacy, Security, Risk and Trust (PASSAT’11) and 2011 IEEE 3rd International Conference on Social Computing (SocialCom’11). IEEE Computer Society, 1318–1326.Google Scholar
- [143] . 2022. Behavior-aware account de-anonymization on Ethereum interaction graph. IEEE Transactions on Information Forensics and Security 17 (2022), 3433–3448.Google ScholarCross Ref
- [144] . 2022. Detecting mixing services via mining bitcoin transaction network with hybrid motifs. IEEE Transactinos on Systems, Man, and Cybernetics Systems 52, 4 (2022), 2237–2249.Google ScholarCross Ref
- [145] chainalysis. [n.d.] https://www.chainalysis.com/Google Scholar
- [146] augur. [n.d.] https://augur.net/Google Scholar
- [147] . 2012. Reinforcement learning utilizes proxemics: An avatar learns to manipulate the position of people in immersive virtual reality. ACM Transactions on Applied Perception 9, 1 (2012), 1–15.
DOI: Google ScholarDigital Library - [148] . 2022. Ukemochi: A video see-through food overlay system for eating experience in the metaverse. In CHI Conference on Human Factors in Computing Systems (CHI’22), Extended Abstracts, , , , and (Eds.). ACM, 380:1–380:8.Google ScholarDigital Library
- [149] . 2021. Physical activity recognition with statistical-deep fusion model using multiple sensory data for smart health. IEEE Internet of Things Journal 8, 3 (2021), 1533–1543.
DOI: Google ScholarCross Ref - [150] Aiarena. 2022. https://docs.aiarena.io/Google Scholar
- [151] Chaos box. 2022. https://rct.ai/zh-hans/Google Scholar
- [152] . 2006. AI-based world behaviour for emergent narratives. In Proceedings of the 2006 ACM SIGCHI International Conference on Advances in Computer Entertainment Technology. 25–es.Google ScholarDigital Library
- [153] . 2023. De-anonymization attacks on metaverse (2023).Google Scholar
- [154] medibloc. 2023. IEEE INFOCOM 2023-IEEE Conference on Computer Communications. IEEE, 1–10. https://medibloc.com/Google Scholar
- [155] . 2018. Converging blockchain and next-generation artificial intelligence technologies to decentralize and accelerate biomedical research and healthcare. Oncotarget 9, 5 (2018), 5665.Google ScholarCross Ref
- [156] . 2020. Integrating blockchain technology with artificial intelligence for cardiovascular medicine. Nature Reviews Cardiology 17, 1 (2020), 1–3.Google ScholarCross Ref
- [157] . 2021. MarkIt: A collaborative artificial intelligence annotation platform leveraging blockchain for medical imaging research. Blockchain in Healthcare Today.Google ScholarCross Ref
Index Terms
- Artificial Intelligence for Web 3.0: A Comprehensive Survey
Recommendations
Web 3.0: The Dawn of Semantic Search
Emerging Web 3.0 applications use semantic technologies to augment the underlying Web system's functionalities.
Toward the Intelligent Web Systems
CICSYN '09: Proceedings of the 2009 First International Conference on Computational Intelligence, Communication Systems and NetworksThe grand vision of Tim Barners-Lee, director of the World Wide Web Consortium (W3C) founded in 1994, of changing the non-semantic Web (Web 1.0, Web 2.0) to semantic Web (Web 3.0) will connect all the web sites and will make their systems interoperable. ...
Innovative semantic web services for next generation academic electronic library via web 3.0 via distributed artificial intelligence
ACIIDS'12: Proceedings of the 4th Asian conference on Intelligent Information and Database Systems - Volume Part IThe purpose of this article is to incubate the establishment of semantic web services for next generation academic electronic library via Web 3.0. The e-library users will be extremely beneficial from the forthcoming semantic social web mechanism. Web ...
Comments