{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:21:09Z","timestamp":1771024869022,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819997848","type":"print"},{"value":"9789819997855","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-9785-5_12","type":"book-chapter","created":{"date-parts":[[2024,2,3]],"date-time":"2024-02-03T18:02:05Z","timestamp":1706983325000},"page":"156-171","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Converging Blockchain and\u00a0Deep Learning in\u00a0UAV Network Defense Strategy: Ensuring Data Security During Flight"],"prefix":"10.1007","author":[{"given":"Zhihao","family":"Li","sequence":"first","affiliation":[]},{"given":"Qi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Weichuan","family":"Mo","sequence":"additional","affiliation":[]},{"given":"Xiaolin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Li","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Yongzhi","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,4]]},"reference":[{"issue":"2","key":"12_CR1","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1109\/COMST.2015.2495297","volume":"18","author":"L Gupta","year":"2015","unstructured":"Gupta, L., Jain, R., Vaszkun, G.: Survey of important issues in UAV communication networks. IEEE Commun. Surv. Tutorials 18(2), 1123\u20131152 (2015)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"4","key":"12_CR2","doi-asserted-by":"publisher","first-page":"2624","DOI":"10.1109\/COMST.2016.2560343","volume":"18","author":"S Hayat","year":"2016","unstructured":"Hayat, S., Yanmaz, E., Muzaffar, R.: Survey on unmanned aerial vehicle networks for civil applications: a communications viewpoint. IEEE Commun. Surv. Tutorials 18(4), 2624\u20132661 (2016)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"2","key":"12_CR3","doi-asserted-by":"publisher","first-page":"3727","DOI":"10.1109\/JIOT.2018.2890428","volume":"6","author":"Q Zhang","year":"2019","unstructured":"Zhang, Q., Jiang, M., Feng, Z., et al.: IoT enabled UAV: network architecture and routing algorithm. IEEE Internet Things J. 6(2), 3727\u20133742 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"12_CR4","doi-asserted-by":"publisher","first-page":"2279","DOI":"10.1007\/s10462-022-10225-1","volume":"56","author":"A Srivastava","year":"2023","unstructured":"Srivastava, A., Prakash, J.: Internet of low-altitude UAVs (IoLoUA): a methodical modeling on integration of internet of \u201cThings\u2019\u2019 with \u201cUAV\u2019\u2019 possibilities and tests. Artif. Intell. Rev. 56(3), 2279\u20132324 (2023)","journal-title":"Artif. Intell. Rev."},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Datta, S.K., Dugelay, J.L., Bonnet, C.: IoT based UAV platform for emergency services. In: Proceedings of the International Conference on Information and Communication Technology Convergence, ICTC 2018, pp. 144\u2013147 (2018)","DOI":"10.1109\/ICTC.2018.8539671"},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1016\/j.procs.2019.02.095","volume":"150","author":"Z Lihua","year":"2019","unstructured":"Lihua, Z., Jianfeng, D., Yu, W., et al.: An online priority configuration algorithm for the UAV swarm in complex context. Procedia Comput. Sci. 150, 567\u2013578 (2019)","journal-title":"Procedia Comput. Sci."},{"issue":"5","key":"12_CR7","doi-asserted-by":"publisher","first-page":"4117","DOI":"10.1109\/JIOT.2022.3230786","volume":"10","author":"M Dai","year":"2022","unstructured":"Dai, M., Huang, N., Wu, Y., et al.: Unmanned-aerial-vehicle-assisted wireless networks: advancements, challenges, and solutions. IEEE Internet Things J. 10(5), 4117\u20134147 (2022)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"12_CR8","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/MCOM.2017.1600443CM","volume":"55","author":"A Orsino","year":"2017","unstructured":"Orsino, A., Ometov, A., Fodor, G., et al.: Effects of heterogeneous mobility on D2D-and drone-assisted mission-critical MTC in 5G. IEEE Commun. Mag. 55(2), 79\u201387 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"12_CR9","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.jnca.2019.02.014","volume":"134","author":"S Peng","year":"2019","unstructured":"Peng, S., Zhou, F., Li, J., et al.: Efficient, dynamic and identity-based remote data integrity checking for multiple replicas. J. Netw. Comput. Appl. 134, 72\u201388 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"54","DOI":"10.3389\/frobt.2020.00054","volume":"7","author":"V Strobel","year":"2020","unstructured":"Strobel, V., Castell\u00f3, F.E., Dorigo, M.: Blockchain technology secures robot swarms: a comparison of consensus protocols and their resilience to byzantine robots. Front. Robot. AI 7, 54 (2020)","journal-title":"Front. Robot. AI"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Wen, Q., Gao, Y., Chen, Z., et al.: A blockchain-based data sharing scheme in the supply chain by IIoT. In: Proceedings of the IEEE International Conference on Industrial Cyber Physical Systems, ICPS 2019, pp. 695\u2013700 (2019)","DOI":"10.1109\/ICPHYS.2019.8780161"},{"issue":"7","key":"12_CR12","doi-asserted-by":"publisher","first-page":"5041","DOI":"10.1109\/TII.2020.3012508","volume":"17","author":"Y Gao","year":"2020","unstructured":"Gao, Y., Chen, Y., Hu, X., et al.: Blockchain based IIoT data sharing framework for SDN-enabled pervasive edge computing. IEEE Trans. Industr. Inf. 17(7), 5041\u20135049 (2020)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"20","key":"12_CR13","doi-asserted-by":"publisher","first-page":"10524","DOI":"10.3390\/app122010524","volume":"12","author":"P Han","year":"2022","unstructured":"Han, P., Sui, A., Wu, J.: Identity management and authentication of a UAV swarm based on a blockchain. Appl. Sci. 12(20), 10524 (2022)","journal-title":"Appl. Sci."},{"key":"12_CR14","series-title":"LNCS","first-page":"429","volume-title":"TAROS 2013","author":"AG Millard","year":"2013","unstructured":"Millard, A.G., Timmis, J., Winfield, A.F.T.: Towards exogenous fault detection in swarm robotic systems. In: Natraj, A., Cameron, S., Melhuish, C., Witkowski, M. (eds.) TAROS 2013. LNCS, vol. 8069, pp. 429\u2013430. Springer, Heidelberg (2013)"},{"key":"12_CR15","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"1037","DOI":"10.1007\/978-3-030-02683-7_77","volume-title":"Proceedings of the Future Technologies Conference (FTC) 2018","author":"E Castell\u00f3 Ferrer","year":"2019","unstructured":"Castell\u00f3 Ferrer, E.: The blockchain: a new framework for robotic swarm systems. In: Arai, K., Bhatia, R., Kapoor, S. (eds.) FTC 2018. AISC, vol. 881, pp. 1037\u20131058. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-02683-7_77"},{"key":"12_CR16","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.comcom.2020.11.008","volume":"165","author":"J Wang","year":"2021","unstructured":"Wang, J., Liu, Y., Niu, S., et al.: Lightweight blockchain assisted secure routing of swarm UAS networking. Comput. Commun. 165, 131\u2013140 (2021)","journal-title":"Comput. Commun."},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Nguyen, T., Katila, R., Gia, T.N.: A novel internet-of-drones and blockchain-based system architecture for search and rescue. In: Proceedings of the International Conference on Mobile Ad Hoc and Smart Systems, MASS 2021, pp. 278\u2013288 (2021)","DOI":"10.1109\/MASS52906.2021.00044"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Lee, S., Kim, M., Kim, M., et al.: Timely update probability analysis of blockchain ledger in UAV-assisted data collection networks. In: Proceedings of the International Conference on Communications, ICC 2022, pp. 4559\u20134564 (2022)","DOI":"10.1109\/ICC45855.2022.9838787"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Ghribi, E., Khoei, T.T., Gorji, H.T., et al.: A secure blockchain-based communication approach for UAV networks. In: Proceedings of the International Conference on Electro Information Technology, EIT 2020, pp. 411\u2013415 (2020)","DOI":"10.1109\/EIT48999.2020.9208314"},{"issue":"7","key":"12_CR20","doi-asserted-by":"publisher","first-page":"4520","DOI":"10.1109\/TII.2021.3120973","volume":"18","author":"G Li","year":"2021","unstructured":"Li, G., He, B., Wang, Z., et al.: Blockchain-enhanced spatiotemporal data aggregation for UAV-assisted wireless sensor networks. IEEE Trans. Industr. Inf. 18(7), 4520\u20134530 (2021)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Safavat, S., Rawat, D.B.: OptiML: an enhanced ML approach towards design of SDN based UAV networks. In: Proceedings of the International Conference on Communications, ICC 2022, pp. 1\u20136 (2022)","DOI":"10.1109\/ICC45855.2022.9839272"},{"key":"12_CR22","first-page":"100495","volume":"36","author":"K Mershad","year":"2022","unstructured":"Mershad, K.: PROACT: parallel multi-miner proof of accumulated trust protocol for internet of drones. Veh. Commun. 36, 100495 (2022)","journal-title":"Veh. Commun."},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Chen, J., Feng, Z., Wen, J.Y., et al.: A container-based DoS attack-resilient control framework for real-time UAV systems. In: Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, DATE 2019, pp. 1222\u20131227 (2019)","DOI":"10.23919\/DATE.2019.8714888"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-9785-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,3]],"date-time":"2024-02-03T18:10:15Z","timestamp":1706983815000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-9785-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819997848","9789819997855"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-9785-5_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"4 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIS&P","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ais&p2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/aisp2023","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"115","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23 large model and security workshop papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}