{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T10:07:53Z","timestamp":1747908473237,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031281235"},{"type":"electronic","value":"9783031281242"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-28124-2_59","type":"book-chapter","created":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T10:20:17Z","timestamp":1680171617000},"page":"629-638","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Feature Extraction Algorithm Based on\u00a0Blockchain Storage that\u00a0Combines ORB Feature Points and\u00a0Quadtree Division"],"prefix":"10.1007","author":[{"given":"Yawei","family":"Li","sequence":"first","affiliation":[]},{"given":"Yanli","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Heng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Neal","family":"Xiong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,31]]},"reference":[{"key":"59_CR1","doi-asserted-by":"crossref","unstructured":"Jia, Y., et al.: A survey of simultaneous localization and mapping for robot. In: IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), vol. 1, pp. 857\u2013861 (2019)","DOI":"10.1109\/IAEAC47372.2019.8997820"},{"issue":"9","key":"59_CR2","doi-asserted-by":"publisher","first-page":"1318","DOI":"10.1016\/j.camwa.2012.02.003","volume":"65","author":"Y Yao","year":"2013","unstructured":"Yao, Y., et al.: Privacy-preserving max\/min query in two-tiered wireless sensor networks. Comput. Math. Appl. 65(9), 1318\u20131325 (2013)","journal-title":"Comput. Math. Appl."},{"key":"59_CR3","doi-asserted-by":"crossref","unstructured":"Guo, J., Ni, R., Zhao, Y.: DeblurSLAM: a novel visual slam system robust in blurring scene. In: IEEE 7th ICVR, pp. 62\u201368 (2021)","DOI":"10.1109\/ICVR51878.2021.9483818"},{"issue":"4","key":"59_CR4","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1007\/s12210-021-01020-1","volume":"32","author":"Y Li","year":"2021","unstructured":"Li, Y., et al.: Research and improvement of feature detection algorithm based on FAST. Rendiconti Lincei. Scienze Fisiche e Naturali 32(4), 775\u2013789 (2021). https:\/\/doi.org\/10.1007\/s12210-021-01020-1","journal-title":"Rendiconti Lincei. Scienze Fisiche e Naturali"},{"key":"59_CR5","series-title":"Texts in Computer Science","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/978-3-030-34372-9_7","volume-title":"Computer Vision","author":"R Szeliski","year":"2022","unstructured":"Szeliski, R.: Feature detection and matching. In: Szeliski, R. (ed.) Computer Vision. TCS, pp. 333\u2013399. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-34372-9_7"},{"key":"59_CR6","doi-asserted-by":"crossref","unstructured":"Qiu, M., et al.: Energy minimization with soft real-time and DVS for uniprocessor and multiprocessor embedded systems. In: IEEE DATE, pp. 1\u20136 (2007)","DOI":"10.1109\/DATE.2007.364537"},{"issue":"3","key":"59_CR7","first-page":"501","volume":"18","author":"M Qiu","year":"2009","unstructured":"Qiu, M., et al.: Dynamic and leakage energy minimization with soft real-time loop scheduling and voltage assignment. IEEE TVLSI 18(3), 501\u2013504 (2009)","journal-title":"IEEE TVLSI"},{"key":"59_CR8","doi-asserted-by":"publisher","first-page":"20021","DOI":"10.1109\/ACCESS.2018.2823979","volume":"6","author":"C Wu","year":"2018","unstructured":"Wu, C., Luo, C., Xiong, N., Zhang, W., et al.: A greedy deep learning method for medical disease analysis. IEEE Access 6, 20021\u201320030 (2018)","journal-title":"IEEE Access"},{"issue":"9","key":"59_CR9","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1016\/j.sysarc.2011.03.005","volume":"57","author":"J Li","year":"2011","unstructured":"Li, J., Ming, Z., et al.: Resource allocation robustness in multi-core embedded systems with inaccurate information. J. Syst. Archit. 57(9), 840\u2013849 (2011)","journal-title":"J. Syst. Archit."},{"issue":"1","key":"59_CR10","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/TSC.2012.32","volume":"7","author":"Y Zhou","year":"2012","unstructured":"Zhou, Y., Zhang, Y., et al.: A bare-metal and asymmetric partitioning approach to client virtualization. IEEE Trans. Serv. Comput. 7(1), 40\u201353 (2012)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"59_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-030-05764-0_17","volume-title":"Smart Blockchain","author":"H Qiu","year":"2018","unstructured":"Qiu, H., Qiu, M., Memmi, G., Ming, Z., Liu, M.: A dynamic scalable blockchain based communication architecture for IoT. In: Qiu, M. (ed.) SmartBlock 2018. LNCS, vol. 11373, pp. 159\u2013166. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-05764-0_17"},{"issue":"6","key":"59_CR12","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1109\/MNET.011.2000141","volume":"34","author":"L Zhihui","year":"2020","unstructured":"Zhihui, L., Gai, K., et al.: Machine learning empowered content delivery: status, challenges, and opportunities. IEEE Netw. 34(6), 228\u2013234 (2020)","journal-title":"IEEE Netw."},{"issue":"12","key":"59_CR13","doi-asserted-by":"publisher","first-page":"3422","DOI":"10.1109\/JSAC.2022.3213353","volume":"40","author":"Y Zhang","year":"2022","unstructured":"Zhang, Y., Gai, K., et al.: Blockchain-empowered efficient data sharing in Internet of Things settings. IEEE J. Sel. Areas Commun. 40(12), 3422\u20133436 (2022)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"2","key":"59_CR14","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1109\/MNET.001.1900243","volume":"34","author":"H Qiu","year":"2019","unstructured":"Qiu, H., Qiu, M., Lu, R.: Secure V2X communication network based on intelligent PKI and edge computing. IEEE Netw. 34(2), 172\u2013178 (2019)","journal-title":"IEEE Netw."},{"key":"59_CR15","doi-asserted-by":"crossref","unstructured":"Qiu, H., Zeng, Y., et al.: DeepSweep: an evaluation framework for mitigating DNN backdoor attacks using data augmentation. In: ACM Asia CCS (2021)","DOI":"10.1145\/3433210.3453108"},{"key":"59_CR16","doi-asserted-by":"crossref","unstructured":"Gai, K., et al.: A novel secure big data cyber incident analytics framework for cloud-based cybersecurity insurance. In: IEEE BigDataSecurity (2016)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.65"},{"issue":"6","key":"59_CR17","doi-asserted-by":"publisher","first-page":"4156","DOI":"10.1109\/TII.2019.2948094","volume":"16","author":"K Gai","year":"2019","unstructured":"Gai, K., Yulu, W., et al.: Differential privacy-based blockchain for industrial Internet-of-Things. IEEE Trans. Ind. Inform. 16(6), 4156\u20134165 (2019)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"59_CR18","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.ins.2019.04.011","volume":"491","author":"Z Tian","year":"2019","unstructured":"Tian, Z., Li, M., et al.: Block-DEF: a secure digital evidence framework using blockchain. Inf. Sci. 491, 151\u2013165 (2019)","journal-title":"Inf. Sci."},{"key":"59_CR19","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/978-3-030-82153-1_37","volume-title":"Knowledge Science, Engineering and Management","author":"Y Zhang","year":"2021","unstructured":"Zhang, Y., Gai, K., Wei, Y., Zhu, L.: BS-KGS: blockchain sharding empowered knowledge graph storage. In: Qiu, H., Zhang, C., Fei, Z., Qiu, M., Kung, S.-Y. (eds.) KSEM 2021. LNCS (LNAI), vol. 12817, pp. 451\u2013462. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-82153-1_37"},{"issue":"3","key":"59_CR20","doi-asserted-by":"publisher","first-page":"2326","DOI":"10.1109\/TNSE.2021.3089435","volume":"8","author":"P Kumar","year":"2021","unstructured":"Kumar, P., Kumar, R., et al.: PPSF: a privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities. IEEE Trans. Netw. Sci. Eng. 8(3), 2326\u20132341 (2021)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"59_CR21","doi-asserted-by":"publisher","first-page":"117883","DOI":"10.1109\/ACCESS.2019.2937098","volume":"7","author":"H Cheng","year":"2019","unstructured":"Cheng, H., et al.: Multi-step data prediction in wireless sensor networks based on one-dimensional CNN and bidirectional LSTM. IEEE Access 7, 117883\u2013117896 (2019)","journal-title":"IEEE Access"},{"issue":"5","key":"59_CR22","first-page":"3316","volume":"18","author":"A Fu","year":"2020","unstructured":"Fu, A., Zhang, X., et al.: VFL: a verifiable federated learning with privacy-preserving for big data in industrial IoT. IEEE TII 18(5), 3316\u20133326 (2020)","journal-title":"IEEE TII"},{"issue":"1","key":"59_CR23","first-page":"347","volume":"8","author":"S Huang","year":"2020","unstructured":"Huang, S., Zeng, Z., et al.: An intelligent collaboration trust interconnections system for mobile information control in ubiquitous 5G networks. IEEE TNSE 8(1), 347\u2013365 (2020)","journal-title":"IEEE TNSE"},{"issue":"2","key":"59_CR24","doi-asserted-by":"publisher","first-page":"0210006","DOI":"10.3788\/LOP202158.0210006","volume":"58","author":"Z Bin","year":"2021","unstructured":"Bin, Z., Xiaohu, Z., Zhishuai, Y.: Image feature matching algorithm based on improved ORB. Laser Optoelectron. Prog. 58(2), 0210006 (2021)","journal-title":"Laser Optoelectron. Prog."},{"key":"59_CR25","doi-asserted-by":"publisher","first-page":"52277","DOI":"10.1109\/ACCESS.2018.2869790","volume":"6","author":"Y Gao","year":"2018","unstructured":"Gao, Y., et al.: Human action monitoring for healthcare based on deep learning. IEEE Access 6, 52277\u201352285 (2018)","journal-title":"IEEE Access"},{"issue":"10","key":"59_CR26","doi-asserted-by":"publisher","first-page":"1231","DOI":"10.1016\/j.sysarc.2013.10.007","volume":"59","author":"F Xia","year":"2013","unstructured":"Xia, F., et al.: Adaptive GTS allocation in IEEE 802.15.4 for real-time wireless sensor networks. J. Syst. Archit. 59(10), 1231\u20131242 (2013)","journal-title":"J. Syst. Archit."},{"issue":"9","key":"59_CR27","doi-asserted-by":"publisher","first-page":"2568","DOI":"10.1177\/0954407021990930","volume":"235","author":"H Dong","year":"2021","unstructured":"Dong, H., Song, W., et al.: Autonomous recognition technology of carrier robot on various terrain environment. Inst. Mech. Eng. Part D J. Autom. Eng. 235(9), 2568\u20132584 (2021)","journal-title":"Inst. Mech. Eng. Part D J. Autom. Eng."},{"key":"59_CR28","doi-asserted-by":"publisher","first-page":"81007","DOI":"10.1109\/ACCESS.2020.2990890","volume":"8","author":"S Yang","year":"2020","unstructured":"Yang, S., et al.: MGC-VSLAM: a meshing-based and geometric constraint VSLAM for dynamic indoor environments. IEEE Access 8, 81007\u201381021 (2020)","journal-title":"IEEE Access"},{"issue":"16","key":"59_CR29","doi-asserted-by":"publisher","first-page":"3103","DOI":"10.3390\/rs13163103","volume":"13","author":"X Yang","year":"2021","unstructured":"Yang, X., Jiang, G.: A practical 3D reconstruction method for weak texture scenes. Remote Sens. 13(16), 3103 (2021)","journal-title":"Remote Sens."},{"issue":"13","key":"59_CR30","doi-asserted-by":"publisher","first-page":"4604","DOI":"10.3390\/s21134604","volume":"21","author":"F Zhou","year":"2021","unstructured":"Zhou, F., Zhang, L., et al.: Improved point-line feature based visual SLAM method for complex environments. Sensors 21(13), 4604 (2021)","journal-title":"Sensors"},{"issue":"5","key":"59_CR31","doi-asserted-by":"publisher","first-page":"1255","DOI":"10.1109\/TRO.2017.2705103","volume":"33","author":"R Mur-Artal","year":"2017","unstructured":"Mur-Artal, R., Tard\u00f3s, J.: ORB-SLAM2: an open-source SLAM system for monocular, stereo, and RGB-D cameras. IEEE Trans. Robot. 33(5), 1255\u20131262 (2017)","journal-title":"IEEE Trans. Robot."},{"key":"59_CR32","doi-asserted-by":"crossref","unstructured":"Lin, C., He, Y.-X., Xiong, N.: An energy-efficient dynamic power management in wireless sensor networks. In: 2006 Fifth International Symposium on Parallel and Distributed Computing, pp. 148\u2013154. IEEE (2006)","DOI":"10.1109\/ISPDC.2006.8"},{"issue":"6","key":"59_CR33","doi-asserted-by":"publisher","first-page":"3939","DOI":"10.1109\/TSMC.2019.2956527","volume":"51","author":"Y Chen","year":"2019","unstructured":"Chen, Y., et al.: KNN-BLOCK DBSCAN: fast clustering for large-scale data. IEEE Trans. Syst. Man Cybern. Syst. 51(6), 3939\u20133953 (2019)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"59_CR34","doi-asserted-by":"publisher","first-page":"117227","DOI":"10.1109\/ACCESS.2019.2933002","volume":"7","author":"C Wu","year":"2019","unstructured":"Wu, C.: UAV autonomous target search based on deep reinforcement learning in complex disaster scene. IEEE Access 7, 117227\u2013117245 (2019)","journal-title":"IEEE Access"},{"key":"59_CR35","doi-asserted-by":"crossref","unstructured":"Liu, X., Yuan, X., Kang, H., Kang, H., Yu, C.: An image registration method based on improved TLD and improved ORB for mobile augmented reality. In: 2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 2127\u20132132. IEEE (2021)","DOI":"10.1109\/SMC52423.2021.9658886"},{"key":"59_CR36","doi-asserted-by":"crossref","unstructured":"Zhang, D., Yang, T.: Visual object tracking algorithm based on biological visual information features and few-shot learning. Comput. Intell. Neurosci. 2022 (2022)","DOI":"10.1155\/2022\/3422859"},{"key":"59_CR37","doi-asserted-by":"publisher","first-page":"33859","DOI":"10.1109\/ACCESS.2019.2904544","volume":"7","author":"J Zhao","year":"2019","unstructured":"Zhao, J., et al.: An effective exponential-based trust and reputation evaluation system in wireless sensor networks. IEEE Access 7, 33859\u201333869 (2019)","journal-title":"IEEE Access"},{"key":"59_CR38","doi-asserted-by":"publisher","first-page":"143471","DOI":"10.1109\/ACCESS.2019.2940995","volume":"7","author":"J Yao","year":"2019","unstructured":"Yao, J., Zhang, P., et al.: An adaptive uniform distribution ORB based on improved quadtree. IEEE Access 7, 143471\u2013143478 (2019)","journal-title":"IEEE Access"},{"issue":"1","key":"59_CR39","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s11263-005-3848-x","volume":"65","author":"K Mikolajczyk","year":"2005","unstructured":"Mikolajczyk, K., Tuytelaars, T., et al.: A comparison of affine region detectors. Intl. J. Comput. Vis. 65(1), 43\u201372 (2005). https:\/\/doi.org\/10.1007\/s11263-005-3848-x","journal-title":"Intl. J. Comput. Vis."}],"container-title":["Lecture Notes in Computer Science","Smart Computing and Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-28124-2_59","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T10:09:27Z","timestamp":1729159767000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-28124-2_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031281235","9783031281242"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-28124-2_59","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SmartCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"smartc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cloud-conf.net\/smartcom\/2022\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"312","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}