skip to main content
survey

Artificial Intelligence for Web 3.0: A Comprehensive Survey

Published:14 May 2024Publication History
Skip Abstract Section

Abstract

Web 3.0 is the next generation of the Internet built on decentralized technologies such as blockchain and cryptography. It is born to solve the problems faced by the previous generation of the Internet such as imbalanced distribution of interests, monopoly of platform resources, and leakage of personal privacy. In this survey, we discuss the latest development status of Web 3.0 and the application of emerging AI technologies in it. First, we investigate the current successful practices of Web 3.0 and various components in the current Web 3.0 ecosystem and thus propose the hierarchical architecture of the Web 3.0 ecosystem from the perspective of application scenarios. The architecture we proposed contains four layers: data management, value circulation, ecological governance, and application scenarios. We dive into the current state of development and the main challenges and issues present in each layer. In this context, we find that AI technology will have great potential. We first briefly introduce the role that artificial intelligence technology may play in the development of Web 3.0. Then, we conduct an in-depth analysis of the current application status of artificial intelligence technology in the four layers of Web 3.0 and provide some insights into its potential future development directions.

REFERENCES

  1. [1] Research Messari. Web3: In a nutshell. [n.d.] Retrieved September 10, 2021 from https://eshita.mirror.xyz/H5bNIXATsWUv_QbbEz6lckYcgAa2rhXEPDRkecOlCOIGoogle ScholarGoogle Scholar
  2. [2] Qian Yao. 2022. Web3. 0: A new generation of Internet that is approaching gradually. China Finance.Google ScholarGoogle Scholar
  3. [3] Nakamoto Satoshi. 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review.Google ScholarGoogle Scholar
  4. [4] Buterin Vitalik. 2014. A next-generation smart contract and decentralized application platform. White Paper 3, 37 (2014), 2–1.Google ScholarGoogle Scholar
  5. [5] Grigg Ian. 2017. Eos-an introduction. White Paper. https://whitepaperdatabase.com/eos-whitepaperGoogle ScholarGoogle Scholar
  6. [6] nostr. [n.d.] https://nostr.com/Google ScholarGoogle Scholar
  7. [7] Gangwar Abhishek, González-Castro Víctor, Alegre Enrique, and Fidalgo Eduardo. 2021. AttM-CNN: Attention and metric learning based CNN for pornography, age and Child Sexual Abuse (CSA) Detection in images. Neurocomputing 445 (2021), 81104.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Alessandretti Laura, ElBahrawy Abeer, Aiello Luca Maria, and Baronchelli Andrea. 2018. Anticipating cryptocurrency prices using machine learning. Complexity 2018 (2018), 1–16.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] Radford Alec, Kim Jong Wook, Hallacy Chris, Ramesh Aditya, Goh Gabriel, Agarwal Sandhini, Sastry Girish, Askell Amanda, Mishkin Pamela, Clark Jack, et al. 2021. Learning transferable visual models from natural language supervision. In International Conference on Machine Learning. PMLR, 87488763.Google ScholarGoogle Scholar
  10. [10] Dathathri Sumanth, Madotto Andrea, Lan Janice, Hung Jane, Frank Eric, Molino Piero, Yosinski Jason, and Liu Rosanne. 2019. Plug and play language models: A simple approach to controlled text generation. arXiv preprint arXiv:1912.02164 (2019).Google ScholarGoogle Scholar
  11. [11] Pawade Dipti, Sakhapara A., Jain Mansi, and Jain Neha. 2018. Story scrambler-automatic text generation using word level RNN-LSTM. International Journal of Information Technology and Computer Science (IJITCS) 10, 6 (2018), 4453.Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Gao Yuan, Gong Maoguo, Xie Yu, and Qin Alex Kai. 2020. An attention-based unsupervised adversarial model for movie review spam detection. IEEE Transactions on Multimedia 23 (2020), 784796.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Wang Yuntao, Su Zhou, Zhang Ning, Xing Rui, Liu Dongxiao, Luan Tom H., and Shen Xuemin. 2022. A survey on metaverse: Fundamentals, security, and privacy. IEEE Communications Surveys & Tutorials 25, 1 (2022), 319–352.Google ScholarGoogle Scholar
  14. [14] Yang Qinglin, Zhao Yetong, Huang Huawei, Xiong Zehui, Kang Jiawen, and Zheng Zibin. 2022. Fusing blockchain and AI with metaverse: A survey. IEEE Open Journal of the Computer Society 3 (2022), 122136.Google ScholarGoogle ScholarCross RefCross Ref
  15. [15] Huynh-The Thien, Pham Quoc-Viet, Pham Xuan-Qui, Nguyen Thanh Thi, Han Zhu, and Kim Dong-Seong. 2023. Artificial intelligence for the metaverse: A survey. Engineering Applications of Artificial Intelligence 117 (2023), 105581.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] Mukhopadhyay Ujan, Skjellum Anthony, Hambolu Oluwakemi, Oakley Jon, Yu Lu, and Brooks Richard. 2016. A brief survey of cryptocurrency systems. In 2016 14th Annual Conference on Privacy, Security and Trust (PST’16). IEEE, 745752.Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] Zarrin Javad, Phang Hao Wen, Saheer Lakshmi Babu, and Zarrin Bahram. 2021. Blockchain for decentralization of internet: prospects, trends, and challenges. Cluster Computing 24, 4 (2021), 28412866.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Yang Wenli, Aghasian Erfan, Garg Saurabh, Herbert David, Disiuta Leandro, and Kang Byeong. 2019. A survey on blockchain-based internet service architecture: Requirements, challenges, trends, and future. IEEE Access 7 (2019), 7584575872.Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Gilani Komal, Bertin Emmanuel, Hatin Julien, and Crespi Noel. 2020. A survey on blockchain-based identity management and decentralized privacy for personal data. In 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS’20). IEEE, 97101.Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Berners-Lee Tim. 1989. Tim berners-lee. (1989).Google ScholarGoogle Scholar
  21. [21] Raggett Dave, Hors Arnaud Le, Jacobs Ian, et al. 1999. HTML 4.01 Specification. W3C Recommendation 24 (1999).Google ScholarGoogle Scholar
  22. [22] Fielding Roy, Gettys Jim, Mogul Jeffrey, Frystyk Henrik, Masinter Larry, Leach Paul, and Berners-Lee Tim. 1999. Hypertext Transfer Protocol–HTTP/1.1. Technical Report.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23] Toledano Cristina Aced. 2013. Web 2.0: The origin of the word that has changed the way we understand public relations. In Barcelona International PR Conference.Google ScholarGoogle Scholar
  24. [24] Berners-Lee Tim. [n.d.] Solid. Retrieved October 25, 2022 from https://solidproject.org/aboutGoogle ScholarGoogle Scholar
  25. [25] foundation Web3. 2022. Web3.0 technology stack. https://web3.foundation/abouGoogle ScholarGoogle Scholar
  26. [26] Cao Longbing. 2022. Decentralized ai: Edge intelligence and smart blockchain, metaverse, web3, and desci. IEEE Intelligent Systems 37, 3 (2022), 619.Google ScholarGoogle ScholarCross RefCross Ref
  27. [27] Zhao Yi, Xu Ke, Chen Jiahui, and Tan Qi. 2022. Collaboration-enabled intelligent internet architecture: Opportunities and challenges. IEEE Network 36, 5 (2022), 98105.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Noble William S.. 2006. What is a support vector machine? Nature Biotechnology 24, 12 (2006), 15651567.Google ScholarGoogle ScholarCross RefCross Ref
  29. [29] Yampolskiy Roman V., Klare Brendan, and Jain Anil K.. 2012. Face recognition in the virtual world: recognizing avatar faces. In 2012 11th International Conference on Machine Learning and Applications, Vol. 1. IEEE, 4045.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. [30] Webb Geoffrey I., Keogh Eamonn, and Miikkulainen Risto. 2010. Naïve Bayes. Encyclopedia of Machine Learning 15 (2010), 713714.Google ScholarGoogle Scholar
  31. [31] Bauer Josef and Jannach Dietmar. 2018. Optimal pricing in e-commerce based on sparse and noisy data. Decision Support Systems 106 (2018), 5363.Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] Myles Anthony J., Feudale Robert N., Liu Yang, Woody Nathaniel A., and Brown Steven D.. 2004. An introduction to decision tree modeling. Journal of Chemometrics: A Journal of the Chemometrics Society 18, 6 (2004), 275285.Google ScholarGoogle ScholarCross RefCross Ref
  33. [33] Rigatti Steven J.. 2017. Random forest. Journal of Insurance Medicine 47, 1 (2017), 3139.Google ScholarGoogle ScholarCross RefCross Ref
  34. [34] Shen Meng, Liu Yiting, Zhu Liehuang, Du Xiaojiang, and Hu Jiankun. 2021. Fine-grained webpage fingerprinting using only packet length information of encrypted traffic. IEEE Transactions on Information Forensics and Security 16 (2021), 20462059.Google ScholarGoogle ScholarCross RefCross Ref
  35. [35] Kim Phil. 2017. Convolutional neural network. In MATLAB Deep Learning. Springer, 121147.Google ScholarGoogle ScholarCross RefCross Ref
  36. [36] Mordvintsev Alexander, Olah Christopher, and Tyka Mike. 2015. Inceptionism: Going Deeper into Neural Networks. https://research.googleblog.com/2015/06/inceptionism-going-deeper-into-neural.htmlGoogle ScholarGoogle Scholar
  37. [37] Gatys Leon A., Ecker Alexander S., and Bethge Matthias. 2016. Image style transfer using convolutional neural networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 24142423.Google ScholarGoogle ScholarCross RefCross Ref
  38. [38] Chen Jianwen, Duan Kai, Zhang Rumin, Zeng Liaoyuan, and Wang Wenyi. 2018. An AI based super nodes selection algorithm in blockchain networks. arXiv preprint arXiv:1808.00216 (2018).Google ScholarGoogle Scholar
  39. [39] Wazir Abdulaziz Saleh Ba, Karim Hezerul Abdul, Abdullah Mohd Haris Lye, Mansor Sarina, AlDahoul Nouar, Fauzi Mohammad Faizal Ahmad, and See John. 2020. Spectrogram-based classification of spoken foul language using deep CNN. In 2020 IEEE 22nd International Workshop on Multimedia Signal Processing (MMSP’20). IEEE, 16.Google ScholarGoogle ScholarCross RefCross Ref
  40. [40] Wazir Abdulaziz Saleh Ba, Karim Hezerul Abdul, Abdullah Mohd Haris Lye, AlDahoul Nouar, Mansor Sarina, Fauzi Mohammad Faizal Ahmad, See John, and Naim Ahmad Syazwan. 2021. Design and implementation of fast spoken foul language recognition with different end-to-end deep neural network architectures. Sensors 21, 3 (2021), 710.Google ScholarGoogle ScholarCross RefCross Ref
  41. [41] Grossberg Stephen. 2013. Recurrent neural networks. Scholarpedia 8, 2 (2013), 1888.Google ScholarGoogle ScholarCross RefCross Ref
  42. [42] Zhao Qi. 2020. A deep learning framework for predicting digital asset price movement from trade-by-trade data. arXiv preprint arXiv:2010.07404 (2020).Google ScholarGoogle Scholar
  43. [43] Saad Muhammad, Choi Jinchun, Nyang DaeHun, Kim Joongheon, and Mohaisen Aziz. 2019. Toward characterizing blockchain-based cryptocurrencies for highly accurate predictions. IEEE Systems Journal 14, 1 (2019), 321332.Google ScholarGoogle ScholarCross RefCross Ref
  44. [44] Chuttur Mohammad Yasser and Nazurally A.. 2022. A multi-modal approach to detect inappropriate cartoon video contents using deep learning networks. Multimedia Tools and Applications 81, 12 (2022), 1688116900.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. [45] Zhang Si, Tong Hanghang, Xu Jiejun, and Maciejewski Ross. 2019. Graph convolutional networks: A comprehensive review. Computational Social Networks 6, 1 (2019), 123.Google ScholarGoogle ScholarCross RefCross Ref
  46. [46] Shen Jie, Zhou Jiajun, Xie Yunyi, Yu Shanqing, and Xuan Qi. 2021. Identity inference on blockchain using graph neural network. CoRR abs/2104.06559 (2021). https://arxiv.org/abs/2104.06559Google ScholarGoogle Scholar
  47. [47] Chen Liang, Peng Jiaying, Liu Yang, Li Jintang, Xie Fenfang, and Zheng Zibin. 2021. Phishing scams detection in ethereum transaction network. ACM Transactions on Internet Technology 21, 1 (2021), 10:1–10:16.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. [48] Shen Meng, Liu Yiting, Zhu Liehuang, Du Xiaojiang, and Hu Jiankun. 2021. Fine-grained webpage fingerprinting using only packet length information of encrypted traffic. IEEE Transactions on Information Forensics and Security 16 (2021), 20462059.Google ScholarGoogle ScholarCross RefCross Ref
  49. [49] Qin Rui, Ding Wenwen, et al. 2022. Web3-based decentralized autonomous organizations and operations: Architectures, models, and mechanisms. IEEE Transactions on Systems, Man, and Cybernetics: Systems 53, 4 (2022), 2073–2082.Google ScholarGoogle Scholar
  50. [50] Bravo-Marquez Felipe, Reeves Steve, and Ugarte Martin. 2019. Proof-of-learning: A blockchain consensus mechanism based on machine learning competitions. In 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON’19). IEEE, 119124.Google ScholarGoogle ScholarCross RefCross Ref
  51. [51] Salimitari Mehrdad, Joneidi Mohsen, and Chatterjee Mainak. 2019. Ai-enabled blockchain: An outlier-aware consensus protocol for blockchain-based IoT networks. In 2019 IEEE Global Communications Conference (GLOBECOM’19). IEEE, 16.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. [52] Mahbub Upal, Komulainen Jukka, Ferreira Denzil, and Chellappa Rama. 2019. Continuous authentication of smartphones based on application usage. IEEE Transactions on Biometrics, Behavior, and Identity Science 1, 3 (2019), 165180.Google ScholarGoogle ScholarCross RefCross Ref
  53. [53] Agarwal Anish, Dahleh Munther, and Sarkar Tuhin. 2019. A marketplace for data: An algorithmic solution. In Proceedings of the 2019 ACM Conference on Economics and Computation. 701726.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. [54] Zhou Xiaoshan and Liao Pin-Chao. 2022. A privacy-preserving data storage and service framework based on deep learning and blockchain for construction workers’ wearable IoT sensors. arXiv preprint arXiv:2211.10713 (2022).Google ScholarGoogle Scholar
  55. [55] Ali Aitizaz, Pasha Muhammad Fermi, Ali Jehad, Fang Ong Huey, Masud Mehedi, Jurcut Anca Delia, and Alzain Mohammed A.. 2022. Deep learning based homomorphic secure search-able encryption for keyword search in blockchain healthcare system: A novel approach to cryptography. Sensors 22, 2 (2022), 528.Google ScholarGoogle ScholarCross RefCross Ref
  56. [56] Liu Yang, Wang Hongsheng, Peng Mugen, Guan Jianfeng, and Wang Yu. 2020. An incentive mechanism for privacy-preserving crowdsensing via deep reinforcement learning. IEEE Internet of Things Journal 8, 10 (2020), 86168631.Google ScholarGoogle ScholarCross RefCross Ref
  57. [57] Momtaz Paul P.. 2022. Some very simple economics of web3 and the metaverse. FinTech 1, 3 (2022), 225234.Google ScholarGoogle ScholarCross RefCross Ref
  58. [58] Xu Jia, Rao Zhengqiang, Xu Lijie, Yang Dejun, and Li Tao. 2019. Incentive mechanism for multiple cooperative tasks with compatible users in mobile crowd sensing via online communities. IEEE Transactions on Mobile Computing 19, 7 (2019), 16181633.Google ScholarGoogle ScholarCross RefCross Ref
  59. [59] Zhan Yufeng, Liu Chi Harold, Zhao Yinuo, Zhang Jiang, and Tang Jian. 2019. Free market of multi-leader multi-follower mobile crowdsensing: An incentive mechanism design by deep reinforcement learning. IEEE Transactions on Mobile Computing 19, 10 (2019), 23162329.Google ScholarGoogle ScholarCross RefCross Ref
  60. [60] Shinkuma Ryoichi, Takagi Rieko, Inagaki Yuichi, Oki Eiji, and Xhafa Fatos. 2020. Incentive mechanism for mobile crowdsensing in spatial information prediction using machine learning. In International Conference on Advanced Information Networking and Applications. Springer, 792803.Google ScholarGoogle ScholarCross RefCross Ref
  61. [61] Moreira Danilo Coura, Pereira Eanes Torres, and Alvarez Marco. 2020. PEDA 376K: A novel dataset for deep-learning based porn-detectors. In 2020 International Joint Conference on Neural Networks (IJCNN’20). IEEE, 18.Google ScholarGoogle ScholarCross RefCross Ref
  62. [62] Yu Xingxin, Zhao Haoyue, Hou Botao, Ying Zonghao, and Wu Bin. 2021. DeeSCVHunter: A deep learning-based framework for smart contract vulnerability detection. In 2021 International Joint Conference on Neural Networks (IJCNN’21). 18. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  63. [63] Tann Wesley Joon-Wie, Han Xing Jie, Gupta Sourav Sen, and Ong Yew-Soon. 2018. Towards safer smart contracts: A sequence learning approach to detecting vulnerabilities. CoRR abs/1811.06632 (2018). arXiv:1811.06632 http://arxiv.org/abs/1811.06632Google ScholarGoogle Scholar
  64. [64] Zhuang Yuan, Liu Zhenguang, Qian Peng, Liu Qi, Wang Xiang, and He Qinming. 2021. Smart contract vulnerability detection using graph neural networks. InInternational Joint Conference on Artificial Intelligence (IJCAI’20). Article 454, 8 pages.Google ScholarGoogle Scholar
  65. [65] Mistry Chinmay, Thakker Urvish, Gupta Rajesh, Obaidat Mohammad S., Tanwar Sudeep, Kumar Neeraj, and Rodrigues Joel J. P. C.. 2021. MedBlock: An AI-enabled and blockchain-driven medical healthcare system for COVID-19. In IEEE International Conference on Communications (ICC’21). 16. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  66. [66] Bhattacharya Pronaya, Obaidat Mohammad S., Savaliya Darshan, Sanghavi Sakshi, Tanwar Sudeep, and Sadaun Balqies. 2022. Metaverse assisted telesurgery in healthcare 5.0: An interplay of blockchain and explainable AI. In 2022 International Conference on Computer, Information and Telecommunication Systems (CITS’22). 15. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  67. [67] Lai Kuan-Ting, Lin Chia-Chih, Kang Chun-Yao, Liao Mei-Enn, and Chen Ming-Syan. 2018. VIVID: Virtual environment for visual deep learning. In Proceedings of the 26th ACM International Conference on Multimedia. 1356–1359. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. [68] Chen Dawei, Xie Linda Jiang, Kim BaekGyu, Wang Li, Hong Choong Seon, Wang Li-Chun, and Han Zhu. 2020. Federated learning based mobile edge computing for augmented reality applications. In 2020 International Conference on Computing, Networking and Communications (ICNC’20). 767773. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  69. [69] Vora Jayneel, Nayyar Anand, Tanwar Sudeep, Tyagi Sudhanshu, Kumar Neeraj, Obaidat M. S., and Rodrigues Joel J. P. C.. 2018. BHEEM: A blockchain-based framework for securing electronic health records. In 2018 IEEE Globecom Workshops (GC Wkshps’18). 16. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  70. [70] Liu Chi Harold, Lin Qiuxia, and Wen Shilin. 2018. Blockchain-enabled data collection and sharing for industrial IoT with deep reinforcement learning. IEEE Transactions on Industrial Informatics 15, 6 (2018), 35163526.Google ScholarGoogle ScholarCross RefCross Ref
  71. [71] Tang Xiao, Lan Xunqiang, Li Lixin, Zhang Yan, and Han Zhu. 2022. Incentivizing proof-of-stake blockchain for secured data collection in UAV-assisted IoT: A multi-agent reinforcement learning approach. IEEE Journal on Selected Areas in Communications 40, 12 (2022), 34703484.Google ScholarGoogle ScholarCross RefCross Ref
  72. [72] Zhuang Weihua, Ye Qiang, Lyu Feng, Cheng Nan, and Ren Ju. 2020. SDN/NFV-empowered future IoV with enhanced communication, computing, and caching. Proceedings of the IEEE 108, 2 (2020), 274291.Google ScholarGoogle ScholarCross RefCross Ref
  73. [73] Xu Xiaobin, Zhao Hui, Yao Haipeng, and Wang Shangguang. 2021. A blockchain-enabled energy-efficient data collection system for UAV-assisted IoT. IEEE Internet of Things Journal 8, 4 (2021), 24312443. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  74. [74] Yun Jusik, Goh Yunyeong, and Chung Jong-Moon. 2021. DQN-based optimization framework for secure sharded blockchain systems. IEEE Internet of Things Journal 8, 2 (2021), 708722. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  75. [75] Bai Xuetao, Tu Shanshan, Waqas Muhammad, Wu Aiming, Zhang Yihe, and Yang Yongjie. 2022. Blockchain enable IoT using deep reinforcement learning: A novel architecture to ensure security of data sharing and storage. In International Conference on Artificial Intelligence and Security. Springer, 586597.Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. [76] Cui Laizhong, Su Xiaoxin, Ming Zhongxing, Chen Ziteng, Yang Shu, Zhou Yipeng, and Xiao Wei. 2022. CREAT: Blockchain-assisted compression algorithm of federated learning for content caching in edge computing. IEEE Internet of Things Journal 9, 16 (2022), 1415114161.Google ScholarGoogle ScholarCross RefCross Ref
  77. [77] Farquhar Collin, Kumar Prem Sagar Pattanshetty Vasanth, Jagannath Anu, and Jagannath Jithin. 2022. Distributed transmission control for wireless networks using multi-agent reinforcement learning. CoRR abs/2205.06800 (2022).Google ScholarGoogle Scholar
  78. [78] Luong Nguyen Cong, Anh Tran The, Binh Huynh Thi Thanh, Niyato Dusit, Kim Dong In, and Liang Ying-Chang. 2019. Joint transaction transmission and channel selection in cognitive radio based blockchain networks: A deep reinforcement learning approach. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP’19). IEEE, 84098413.Google ScholarGoogle ScholarCross RefCross Ref
  79. [79] Xu Jianlong, Lin Jian, Liang Wei, and Li Kuan-Ching. 2022. Privacy preserving personalized blockchain reliability prediction via federated learning in IoT environments. Cluster Computing 25, 4 (2022), 25152526.Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. [80] Yang Zhaoxin, Yang Ruizhe, Yu F. Richard, Li Meng, Zhang Yanhua, and Teng Yinglei. 2022. Sharded blockchain for collaborative computing in the internet of things: Combined of dynamic clustering and deep reinforcement learning approach. IEEE Internet of Things Journal 9, 17 (2022), 1649416509.Google ScholarGoogle ScholarCross RefCross Ref
  81. [81] He Xingqiu, Shen Yuhang, Zhu Hongxi, Wang Sheng, You Chaoqun, and Quek Tony Q. S.. 2022. Social welfare maximization for collaborative edge computing: A deep reinforcement learning-based approach. CoRR abs/2211.06861 (2022).Google ScholarGoogle Scholar
  82. [82] Dai Zhenwei, Shrivastava Anshumali, Reviriego Pedro, and Hernández José Alberto. 2022. Optimizing learned Bloom filters: How much should be learned? IEEE Embedded Systems Letters 14, 3 (2022), 123–126.Google ScholarGoogle ScholarCross RefCross Ref
  83. [83] Li Jun, Shao Yumeng, Wei Kang, Ding Ming, Ma Chuan, Shi Long, Han Zhu, and Poor H. Vincent. 2021. Blockchain assisted decentralized federated learning (BLADE-FL): Performance analysis and resource allocation. CoRR abs/2101.06905 (2021).Google ScholarGoogle Scholar
  84. [84] Wang Jin, Hu Jia, Min Geyong, Zomaya Albert Y., and Georgalas Nektarios. 2020. Fast adaptive task offloading in edge computing based on meta reinforcement learning. IEEE Transactions on Parallel and Distributed Systems 32, 1 (2020), 242253.Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. [85] Lin Yijing, Gao Zhipeng, Du Hongyang, Niyato Dusit, Kang Jiawen, Deng Ruilong, and Shen Xuemin Sherman. 2022. A unified blockchain-semantic framework for wireless edge intelligence enabled web 3.0. arXiv preprint arXiv:2210.15130 (2022).Google ScholarGoogle Scholar
  86. [86] Shen Xuemin, Gao Jie, Wu Wen, Lyu Kangjia, Li Mushu, Zhuang Weihua, Li Xu, and Rao Jaya. 2020. AI-assisted network-slicing based next-generation wireless networks. IEEE Open Journal of Vehicular Technology 1 (2020), 4566.Google ScholarGoogle ScholarCross RefCross Ref
  87. [87] Wu Wen, Chen Nan, Zhou Conghao, Li Mushu, Shen Xuemin, Zhuang Weihua, and Li Xu. 2021. Dynamic RAN slicing for service-oriented vehicular networks via constrained learning. IEEE Journal of Selected Areas in Communications 39, 7 (2021), 20762089.Google ScholarGoogle ScholarCross RefCross Ref
  88. [88] Zheng Peilin, Zheng Zibin, and Chen Liang. 2019. Selecting reliable blockchain peers via hybrid blockchain reliability prediction. CoRR abs/1910.14614 (2019). arXiv:1910.14614 http://arxiv.org/abs/1910.14614Google ScholarGoogle Scholar
  89. [89] Lu Yunlong, Huang Xiaohong, Zhang Ke, Maharjan Sabita, and Zhang Yan. 2021. Blockchain and federated learning for 5G beyond. IEEE Network 35, 1 (2021), 219225. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  90. [90] Chang Jian, Li Binhong, Xiao Jiang, Lin Licheng, and Jin Hai. 2023. Anole: A Lightweight and verifiable learned-based index for time range query on blockchain systems. In Proceedings of the 28th International Conference on Database Systems for Advanced Applications (DASFAA’23), Part I (Lecture Notes in Computer Science), Wang Xin, Sapino Maria Luisa, Han Wook-Shin, Abbadi Amr El, Dobbie Gill, Feng Zhiyong, Shao Yingxiao, and Yin Hongzhi (Eds.). Vol. 13943. Springer, 519534. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. [91] Svoboda Jan, Monti Federico, and Bronstein Michael M.. 2017. Generative convolutional networks for latent fingerprint reconstruction. In 2017 IEEE International Joint Conference on Biometrics (IJCB’17). IEEE, 429436.Google ScholarGoogle ScholarDigital LibraryDigital Library
  92. [92] Wang Kuo and Kumar Ajay. 2019. Toward more accurate iris recognition using dilated residual features. IEEE Transactions on Information Forensics and Security 14, 12 (2019), 32333245.Google ScholarGoogle ScholarCross RefCross Ref
  93. [93] Consortium The World Wide Web. [n.d.] Decentralized identifiers (DIDs) v1.0. Retrieved July 19, 2022 from https://www.w3.org/TR/did-core/Google ScholarGoogle Scholar
  94. [94] Weyl E Glen, Ohlhaver Puja, and Buterin Vitalik. 2022. Decentralized society: Finding web3’s soul. Available at SSRN 4105763 (2022).Google ScholarGoogle Scholar
  95. [95] Zhang David, Lu Guangming, Zhang Lei, et al. 2018. Advanced Biometrics. Springer.Google ScholarGoogle ScholarCross RefCross Ref
  96. [96] Debard Quentin, Wolf Christian, Canu Stephane, and Arné Julien. 2018. Learning to recognize touch gestures: Recurrent vs. convolutional features and dynamic sampling. In 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG’18). IEEE, 114121.Google ScholarGoogle ScholarDigital LibraryDigital Library
  97. [97] Bader Samira and Amara Najoua Essoukri Ben. 2017. Design of a 3D virtual world to implement a logical access control mechanism based on fingerprints. In 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA’17). 12391246. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  98. [98] Wang Ruizhe, Chen Chih-Fan, Peng Hao, Liu Xudong, Liu Oliver, and Li Xin. 2019. Digital twin: Acquiring high-fidelity 3D avatar from a single image. arXiv preprint arXiv:1912.03455 (2019).Google ScholarGoogle Scholar
  99. [99] Schrotter Gerhard and Hürzeler Christian. 2020. The digital twin of the city of Zurich for urban planning. PFG–Journal of Photogrammetry, Remote Sensing and Geoinformation Science 88, 1 (2020), 99112.Google ScholarGoogle ScholarCross RefCross Ref
  100. [100] Sun Jianshan, Tian Zhiqiang, Fu Yelin, Geng Jie, and Liu Chunli. 2021. Digital twins in human understanding: A deep learning-based method to recognize personality traits. International Journal of Computer Integrated Manufacturing 34, 7–8 (2021), 860873.Google ScholarGoogle ScholarCross RefCross Ref
  101. [101] Karras Tero, Laine Samuli, and Aila Timo. 2019. A style-based generator architecture for generative adversarial networks. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 44014410.Google ScholarGoogle ScholarCross RefCross Ref
  102. [102] Goh G., Ramesh A., Pavlov M., and Gray S.. [n.d.] DALL·E: Creating images from text. Retrieved January 25, 2021 from https://openai.com/blog/dall-e/Google ScholarGoogle Scholar
  103. [103] Xu Lei, Jiang Chunxiao, Qian Yi, Zhao Youjian, Li Jianhua, and Ren Yong. 2016. Dynamic privacy pricing: A multi-armed bandit approach with time-variant rewards. IEEE Transactions on Information Forensics and Security 12, 2 (2016), 271285.Google ScholarGoogle ScholarDigital LibraryDigital Library
  104. [104] Misra Kanishka, Schwartz Eric M., and Abernethy Jacob. 2019. Dynamic online pricing with incomplete information using multiarmed bandit experiments. Marketing Science 38, 2 (2019), 226252.Google ScholarGoogle ScholarDigital LibraryDigital Library
  105. [105] Shen Xuemin, Gao Jie, Wu Wen, Li Mushu, Zhou Conghao, and Zhuang Weihua. 2021. Holistic network virtualization and pervasive network intelligence for 6G. IEEE Communications Surveys & Tutorials 24, 1 (2021), 130.Google ScholarGoogle ScholarCross RefCross Ref
  106. [106] Zhu Jun-Yan, Park Taesung, Isola Phillip, and Efros Alexei A.. 2017. Unpaired image-to-image translation using cycle-consistent adversarial networks. In Proceedings of the IEEE International Conference on Computer Vision. 22232232.Google ScholarGoogle ScholarCross RefCross Ref
  107. [107] Graves Alex. 2013. Generating sequences with recurrent neural networks. arXiv preprint arXiv:1308.0850 (2013).Google ScholarGoogle Scholar
  108. [108] Hong Mingbo, Wang Mantao, Luo Lixin, Tan Xuefeng, Zhang Dejun, and Lao Yike. 2018. Combining gated recurrent unit and attention pooling for sentimental classification. In Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence. 99104.Google ScholarGoogle ScholarDigital LibraryDigital Library
  109. [109] Bowman Samuel R., Vilnis Luke, Vinyals Oriol, Dai Andrew M., Jozefowicz Rafal, and Bengio Samy. 2015. Generating sentences from a continuous space. arXiv preprint arXiv:1511.06349 (2015).Google ScholarGoogle Scholar
  110. [110] OpenAI. [n.d.]Introducing ChatGPT. Retrieved November 30, 2022 from https://openai.com/blog/chatgpt/Google ScholarGoogle Scholar
  111. [111] Jang Huisu and Lee Jaewook. 2017. An empirical study on modeling and prediction of bitcoin prices with Bayesian neural networks based on blockchain information. IEEE Access 6 (2017), 54275437.Google ScholarGoogle ScholarCross RefCross Ref
  112. [112] Tothfalusi Tamas, Varga Eszter, Csiszar Zoltan, and Varga Pál. 2023. ML-based translation methods for protocols and data formats. In 19th International Conference on Network and Service Management (CNSM’23). IEEE, 15. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  113. [113] Vairagade Rupali Sachin and SH Brahmananda. 2022. Enabling machine learning-based side-chaining for improving QoS in blockchain-powered IoT networks. Transactions on Emerging Telecommunications Technologies 33, 4 (2022), e4433.Google ScholarGoogle ScholarDigital LibraryDigital Library
  114. [114] Kang Jiawen, Li Xuandi, Nie Jiangtian, Liu Yi, Xu Minrui, Xiong Zehui, Niyato Dusit, and Yan Qiang. 2022. Communication-efficient and cross-chain empowered federated learning for artificial intelligence of things. IEEE Transactions on Network Science and Engineering 9, 5 (2022), 29662977. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  115. [115] Zhan Yufeng and Zhang Jiang. 2020. An incentive mechanism design for efficient edge learning by deep reinforcement learning approach. In IEEE Conference on Computer Communications (IEEE INFOCOM’20). IEEE, 24892498.Google ScholarGoogle ScholarDigital LibraryDigital Library
  116. [116] Xu Rongxin, Pokhrel Shiva Raj, Lan Qiujun, and Li Gang. 2022. FAIR-BFL: Flexible and incentive redesign for blockchain-based federated learning. arXiv preprint arXiv:2206.12899 (2022).Google ScholarGoogle Scholar
  117. [117] Jian Yifei, Chen Xingshu, and Wang Haizhou. 2022. Fake restaurant review detection using deep neural networks with hybrid feature fusion method. In International Conference on Database Systems for Advanced Applications. Springer, 133148.Google ScholarGoogle ScholarDigital LibraryDigital Library
  118. [118] Chen Weili, Zheng Zibin, Cui Jiahui, Ngai Edith C. H., Zheng Peilin, and Zhou Yuren. 2018. Detecting ponzi schemes on ethereum: Towards healthier blockchain technology. In Proceedings of the 2018 World Wide Web Conference on World Wide Web (WWW’18). ACM, 14091418.Google ScholarGoogle ScholarDigital LibraryDigital Library
  119. [119] Wu Jiajing, Yuan Qi, Lin Dan, You Wei, Chen Weili, Chen Chuan, and Zheng Zibin. 2022. Who are the phishers? Phishing scam detection on ethereum via network embedding. IEEE Transactions on Systems, Man, and Cybernetics Systems 52, 2 (2022), 11561166.Google ScholarGoogle ScholarCross RefCross Ref
  120. [120] Wang Yuntao, Peng Haixia, Su Zhou, Luan Tom H., Benslimane Abderrahim, and Wu Yuan. 2022. A platform-free proof of federated learning consensus mechanism for sustainable blockchains. IEEE Journal on Selected Areas in Communications 40, 12 (2022), 33053324.Google ScholarGoogle ScholarCross RefCross Ref
  121. [121] Jiao Yutao, Wang Ping, Niyato Dusit, Lin Bin, and Kim Dong In. 2020. Toward an automated auction framework for wireless federated learning services market. IEEE Transactions on Mobile Computing 20, 10 (2020), 30343048.Google ScholarGoogle ScholarDigital LibraryDigital Library
  122. [122] Zhan Yufeng, Li Peng, Qu Zhihao, Zeng Deze, and Guo Song. 2020. A learning-based incentive mechanism for federated learning. IEEE Internet of Things Journal 7, 7 (2020), 63606368.Google ScholarGoogle ScholarCross RefCross Ref
  123. [123] Zhao Jie, Zhu Xinghua, Wang Jianzong, and Xiao Jing. 2021. Efficient client contribution evaluation for horizontal federated learning. In 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP’21). IEEE, 30603064.Google ScholarGoogle ScholarCross RefCross Ref
  124. [124] Pandey Anchal, Moharana Sukumar, Mohanty Debi Prasanna, Panwar Archit, Agarwal Dewang, and Thota Siva Prasad. 2021. On-device content moderation. In 2021 International Joint Conference on Neural Networks (IJCNN’21). IEEE, 17.Google ScholarGoogle ScholarCross RefCross Ref
  125. [125] Li Xurong, Yu Kun, Ji Shouling, Wang Yan, Wu Chunming, and Xue Hui. 2020. Fighting against deepfake: Patch&pair convolutional neural networks (PPCNN). In Companion Proceedings of the Web Conference 2020. 8889.Google ScholarGoogle ScholarDigital LibraryDigital Library
  126. [126] Zhao Tianchen, Xu Xiang, Xu Mingze, Ding Hui, Xiong Yuanjun, and Xia Wei. 2021. Learning self-consistency for deepfake detection. In Proceedings of the IEEE/CVF International Conference on Computer Vision. 1502315033.Google ScholarGoogle ScholarCross RefCross Ref
  127. [127] Mittal Trisha, Bhattacharya Uttaran, Chandra Rohan, Bera Aniket, and Manocha Dinesh. 2020. Emotions don’t lie: An audio-visual deepfake detection method using affective cues. In Proceedings of the 28th ACM International Conference on Multimedia. 28232832.Google ScholarGoogle ScholarDigital LibraryDigital Library
  128. [128] Hu Ziheng, Xie Hongtao, Wang Yuxin, Li Jiahong, Wang Zhongyuan, and Zhang Yongdong. 2021. Dynamic inconsistency-aware deepfake video detection. In IJCAI.Google ScholarGoogle ScholarCross RefCross Ref
  129. [129] Wu Peng, Liu Jing, Shi Yujia, Sun Yujia, Shao Fangtao, Wu Zhaoyang, and Yang Zhiwei. 2020. Not only look, but also listen: Learning multimodal violence detection under weak supervision. In European Conference on Computer Vision. Springer, 322339.Google ScholarGoogle ScholarDigital LibraryDigital Library
  130. [130] Cozzolino Davide, Rössler Andreas, Thies Justus, Nießner Matthias, and Verdoliva Luisa. 2021. Id-reveal: Identity-aware deepfake video detection. In Proceedings of the IEEE/CVF International Conference on Computer Vision. 1510815117.Google ScholarGoogle ScholarCross RefCross Ref
  131. [131] Weber Mark, Domeniconi Giacomo, Chen Jie, Weidele Daniel Karl I., Bellei Claudio, Robinson Tom, and Leiserson Charles E.. 2019. Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics. CoRR abs/1908.02591 (2019). http://arxiv.org/abs/1908.02591Google ScholarGoogle Scholar
  132. [132] Tam Da Sun Handason, Lau Wing Cheong, Hu Bin, Ying Qiufang, Chiu Dah Ming, and Liu Hong. 2019. Identifying illicit accounts in large scale e-payment networks: A Graph Representation Learning Approach. CoRR abs/1906.05546 (2019). http://arxiv.org/abs/1906.05546Google ScholarGoogle Scholar
  133. [133] Shen Meng, Gao Zhenbo, Zhu Liehuang, and Xu Ke. Efficient fine-grained website fingerprinting via encrypted traffic analysis with deep learning. In 29th IEEE/ACM International Symposium on Quality of Service (IWQOS’21). IEEE, 110.Google ScholarGoogle Scholar
  134. [134] Shen Meng, Wei Mingwei, Zhu Liehuang, and Wang Mingzhong. 2017. Classification of encrypted traffic with second-order Markov chains and application attribute bigrams. IEEE Transactions on Information Forensics and Security 12, 8 (2017), 18301843. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  135. [135] Shen Meng, Zhang Jinpeng, Xu Ke, Zhu Liehuang, Liu Jiangchuan, and Du Xiaojiang. DeepQoE: Real-time measurement of video QoE from encrypted traffic with deep learning. In 28th IEEE/ACM International Symposium on Quality of Service (IWQoS’20). IEEE, 110.Google ScholarGoogle Scholar
  136. [136] Weng Jiasi, Weng Jian, Huang Hongwei, Cai Chengjun, and Wang Cong. 2021. Fedserving: A federated prediction serving framework based on incentive mechanism. In IEEE Conference on Computer Communications (IEEE INFOCOM’21). IEEE, 110.Google ScholarGoogle ScholarDigital LibraryDigital Library
  137. [137] Yuan Xiaoyong and Zhang Lan. 2022. Membership inference attacks and defenses in neural network pruning. In 31st USENIX Security Symposium (USENIX Security’22). 45614578.Google ScholarGoogle Scholar
  138. [138] An Jian, Wang Zhenxing, He Xin, Gui Xiaolin, Cheng Jindong, and Gui Ruowei. 2022. PPQC: A blockchain-based privacy-preserving quality control mechanism in crowdsensing applications. IEEE/ACM Transactions on Networking 30, 3 (2022), 13521367.Google ScholarGoogle ScholarDigital LibraryDigital Library
  139. [139] Zhang Shijie, Yin Hongzhi, Chen Tong, Huang Zi, Cui Lizhen, and Zhang Xiangliang. 2021. Graph embedding for recommendation against attribute inference attacks. In Proceedings of the Web Conference 2021. 30023014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  140. [140] Sun Jingwei, Li Ang, Wang Binghui, Yang Huanrui, Li Hai, and Chen Yiran. 2021. Soteria: Provable defense against privacy leakage in federated learning from representation perspective. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 93119319.Google ScholarGoogle ScholarCross RefCross Ref
  141. [141] Chen Jiahui, Zhao Yi, Li Qi, Feng Xuewei, and Xu Ke. 2023. FedDef: Defense against gradient leakage in federated learning-based network intrusion detection systems. IEEE Transactions on Information Forensics and Security 18 (2023), 4561–4576.Google ScholarGoogle ScholarDigital LibraryDigital Library
  142. [142] Reid Fergal and Harrigan Martin. An analysis of anonymity in the bitcoin system. In 2011 IEEE 3rd International Conference on Privacy, Security, Risk and Trust (PASSAT’11) and 2011 IEEE 3rd International Conference on Social Computing (SocialCom’11). IEEE Computer Society, 13181326.Google ScholarGoogle Scholar
  143. [143] Zhou Jiajun, Hu Chenkai, Chi Jianlei, Wu Jiajing, Shen Meng, and Xuan Qi. 2022. Behavior-aware account de-anonymization on Ethereum interaction graph. IEEE Transactions on Information Forensics and Security 17 (2022), 34333448.Google ScholarGoogle ScholarCross RefCross Ref
  144. [144] Wu Jiajing, Liu Jieli, Chen Weili, Huang Huawei, Zheng Zibin, and Zhang Yan. 2022. Detecting mixing services via mining bitcoin transaction network with hybrid motifs. IEEE Transactinos on Systems, Man, and Cybernetics Systems 52, 4 (2022), 22372249.Google ScholarGoogle ScholarCross RefCross Ref
  145. [145] chainalysis. [n.d.] https://www.chainalysis.com/Google ScholarGoogle Scholar
  146. [146] augur. [n.d.] https://augur.net/Google ScholarGoogle Scholar
  147. [147] Kastanis Iason and Slater Mel. 2012. Reinforcement learning utilizes proxemics: An avatar learns to manipulate the position of people in immersive virtual reality. ACM Transactions on Applied Perception 9, 1 (2012), 1–15. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  148. [148] Nakano Kizashi, Horita Daichi, Isoyama Naoya, Uchiyama Hideaki, and Kiyokawa Kiyoshi. 2022. Ukemochi: A video see-through food overlay system for eating experience in the metaverse. In CHI Conference on Human Factors in Computing Systems (CHI’22), Extended Abstracts, Barbosa Simone D. J., Lampe Cliff, Appert Caroline, and Shamma David A. (Eds.). ACM, 380:1–380:8.Google ScholarGoogle ScholarDigital LibraryDigital Library
  149. [149] Huynh-The Thien, Hua Cam-Hao, Tu Nguyen Anh, and Kim Dong-Seong. 2021. Physical activity recognition with statistical-deep fusion model using multiple sensory data for smart health. IEEE Internet of Things Journal 8, 3 (2021), 15331543. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  150. [150] Aiarena. 2022. https://docs.aiarena.io/Google ScholarGoogle Scholar
  151. [151] Chaos box. 2022. https://rct.ai/zh-hans/Google ScholarGoogle Scholar
  152. [152] Lugrin Jean-Luc and Cavazza Marc. 2006. AI-based world behaviour for emergent narratives. In Proceedings of the 2006 ACM SIGCHI International Conference on Advances in Computer Entertainment Technology. 25–es.Google ScholarGoogle ScholarDigital LibraryDigital Library
  153. [153] Meng Y., Zhan Y., Li J., Du S., Zhu H., and Shen X.. 2023. De-anonymization attacks on metaverse (2023).Google ScholarGoogle Scholar
  154. [154] medibloc. 2023. IEEE INFOCOM 2023-IEEE Conference on Computer Communications. IEEE, 1–10. https://medibloc.com/Google ScholarGoogle Scholar
  155. [155] Mamoshina Polina, Ojomoko Lucy, Yanovich Yury, Ostrovski Alex, Botezatu Alex, Prikhodko Pavel, Izumchenko Eugene, Aliper Alexander, Romantsov Konstantin, Zhebrak Alexander, et al. 2018. Converging blockchain and next-generation artificial intelligence technologies to decentralize and accelerate biomedical research and healthcare. Oncotarget 9, 5 (2018), 5665.Google ScholarGoogle ScholarCross RefCross Ref
  156. [156] Krittanawong Chayakrit, Rogers Albert J., Aydar Mehmet, Choi Edward, Johnson Kipp W., Wang Zhen, and Narayan Sanjiv M.. 2020. Integrating blockchain technology with artificial intelligence for cardiovascular medicine. Nature Reviews Cardiology 17, 1 (2020), 13.Google ScholarGoogle ScholarCross RefCross Ref
  157. [157] Witowski Jan, Choi Jongmun, Jeon Soomin, Kim Doyun, Chung Joowon, Conklin John, Longo Maria Gabriela Figueiro, Succi Marc D., and Do Synho. 2021. MarkIt: A collaborative artificial intelligence annotation platform leveraging blockchain for medical imaging research. Blockchain in Healthcare Today.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Artificial Intelligence for Web 3.0: A Comprehensive Survey

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Computing Surveys
          ACM Computing Surveys  Volume 56, Issue 10
          October 2024
          325 pages
          ISSN:0360-0300
          EISSN:1557-7341
          DOI:10.1145/3613652
          Issue’s Table of Contents

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 14 May 2024
          • Online AM: 11 April 2024
          • Accepted: 31 March 2024
          • Revised: 28 January 2024
          • Received: 26 March 2023
          Published in csur Volume 56, Issue 10

          Check for updates

          Qualifiers

          • survey
        • Article Metrics

          • Downloads (Last 12 months)394
          • Downloads (Last 6 weeks)264

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Full Text

        View this article in Full Text.

        View Full Text