{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T04:21:56Z","timestamp":1773030116501,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2023,8,7]],"date-time":"2023-08-07T00:00:00Z","timestamp":1691366400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,7]],"date-time":"2023-08-07T00:00:00Z","timestamp":1691366400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-16406-6","type":"journal-article","created":{"date-parts":[[2023,8,7]],"date-time":"2023-08-07T06:02:16Z","timestamp":1691388136000},"page":"22609-22637","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Hybrid deep learning algorithm for smart cities security enhancement through blockchain and internet of things"],"prefix":"10.1007","volume":"83","author":[{"given":"Sourav","family":"Mishra","sequence":"first","affiliation":[]},{"given":"Vijay Kumar","family":"Chaurasiya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,7]]},"reference":[{"key":"16406_CR1","doi-asserted-by":"publisher","unstructured":"Karthick S, Perumal Sankar S, Arul Teen YP (2021) Trust-Distrust Protocol for Secure Routing in Self-Organizing Networks. In 2018 International Conference on Emerging Trends and Innovations In Engineering And Technological Research (ICETIETR), pp 1-8. https:\/\/doi.org\/10.1109\/ICETIETR.2018.8529016","DOI":"10.1109\/ICETIETR.2018.8529016"},{"issue":"4","key":"16406_CR2","doi-asserted-by":"publisher","first-page":"102549","DOI":"10.1016\/j.ipm.2021.102549","volume":"58","author":"AA Abd El-Latif","year":"2021","unstructured":"Abd El-Latif AA, Abd-El-Atty B, Mehmood I, Muhammad K, Venegas-Andraca SE, Peng J (2021) Quantum-inspired blockchain-based cybersecurity: securing smart edge utilities in IoT-based smart cities. Inf Process Manag 58(4):102549","journal-title":"Inf Process Manag"},{"key":"16406_CR3","doi-asserted-by":"publisher","first-page":"116158","DOI":"10.1016\/j.eswa.2021.116158","volume":"191","author":"L Abualigah","year":"2022","unstructured":"Abualigah L, Abd Elaziz M, Sumari P, Geem ZW, Gandomi AH (2022) Reptile search algorithm (RSA): a nature-inspired meta-heuristic optimizer. Expert Syst Appl 191:116158","journal-title":"Expert Syst Appl"},{"key":"16406_CR4","doi-asserted-by":"publisher","first-page":"2554","DOI":"10.1016\/j.procs.2020.03.309","volume":"167","author":"S Ahlawat","year":"2020","unstructured":"Ahlawat S, Choudhary A (2020) Hybrid CNN-SVM classifier for handwritten digit recognition. Proc Comput Sci 167:2554\u20132560","journal-title":"Proc Comput Sci"},{"key":"16406_CR5","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/3409934.3409957","volume-title":"Proceedings of the 2020 2nd international electronics communication conference","author":"N Alasbali","year":"2020","unstructured":"Alasbali N, Azzuhri SR, Salleh R (2020) A blockchain-based smart network for IoT-driven smart cities. In: Proceedings of the 2020 2nd international electronics communication conference, pp 17\u201323"},{"issue":"21","key":"16406_CR6","doi-asserted-by":"publisher","first-page":"2705","DOI":"10.3390\/math9212705","volume":"9","author":"N Bacanin","year":"2021","unstructured":"Bacanin N, Stoean R, Zivkovic M, Petrovic A, Rashid TA, Bezdan T (2021) Performance of a novel chaotic firefly algorithm with enhanced exploration for tackling global optimization problems: application for dropout regularization. Mathematics 9(21):2705","journal-title":"Mathematics"},{"issue":"10","key":"16406_CR7","doi-asserted-by":"publisher","first-page":"e0275727","DOI":"10.1371\/journal.pone.0275727","volume":"17","author":"N Bacanin","year":"2022","unstructured":"Bacanin N, Budimirovic N, Strumberger I, Alrasheedi AF, Abouhawwash M (2022) Novel chaotic oppositional fruit fly optimization algorithm for feature selection applied on COVID 19 patients\u2019 health prediction. PLoS One 17(10):e0275727","journal-title":"PLoS One"},{"key":"16406_CR8","doi-asserted-by":"publisher","first-page":"4636","DOI":"10.3390\/s20164636","volume":"20","author":"JV Botello","year":"2020","unstructured":"Botello JV, Mesa AP, Rodr\u00edguez FA, D\u00edaz-L\u00f3pez D, Nespoli P, M\u00e1rmol FG (2020) BlockSIEM: protecting smart city services through a blockchain-based and distributed SIEM. Sensors 20:4636","journal-title":"Sensors"},{"key":"16406_CR9","first-page":"1","volume-title":"2020 5th international conference on cloud computing and artificial intelligence: technologies and applications (CloudTech)","author":"D El Majdoubi","year":"2020","unstructured":"El Majdoubi D, El Bakkali H, Sadki S (2020) Towards smart blockchain-based system for privacy and security in a smart city environment. In: 2020 5th international conference on cloud computing and artificial intelligence: technologies and applications (CloudTech). IEEE, pp 1\u20137"},{"key":"16406_CR10","doi-asserted-by":"publisher","first-page":"137825","DOI":"10.1109\/ACCESS.2020.3012411","volume":"8","author":"AA Elsaeidy","year":"2020","unstructured":"Elsaeidy AA, Jagannath N, Sanchis AG, Jamalipour A, Munasinghe KS (2020) Replay attack detection in smart cities using deep learning. IEEE Access 8:137825\u2013137837","journal-title":"IEEE Access"},{"key":"16406_CR11","doi-asserted-by":"publisher","first-page":"102468","DOI":"10.1016\/j.ipm.2020.102468","volume":"58","author":"C Esposito","year":"2021","unstructured":"Esposito C, Ficco M, Gupta BB (2021) Blockchain-based authentication and authorization for smart city applications. Inf Process Manag 58:102468","journal-title":"Inf Process Manag"},{"key":"16406_CR12","doi-asserted-by":"publisher","first-page":"8963","DOI":"10.1109\/TIE.2020.3016268","volume":"68","author":"S Fang","year":"2020","unstructured":"Fang S, Chen Y, Lin H (2020) A self-adaptive control for phase-controlled electromagnetic contactor using weighted moving average filter. IEEE Trans Ind Electron 68:8963\u20138972","journal-title":"IEEE Trans Ind Electron"},{"key":"16406_CR13","doi-asserted-by":"publisher","first-page":"3889","DOI":"10.3390\/su11143889","volume":"11","author":"S Gong","year":"2019","unstructured":"Gong S, Tcydenova E, Jo J, Lee Y, Park JH (2019) Blockchain-based secure device management framework for an internet of things network in a smart city. Sustainability 11:3889","journal-title":"Sustainability"},{"key":"16406_CR14","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MNET.001.1900178","volume":"34","author":"S Hakak","year":"2020","unstructured":"Hakak S, Khan WZ, Gilkar GA, Imran M, Guizani N (2020) Securing smart cities through blockchain technology: architecture, requirements, and challenges. IEEE Netw 34:8\u201314","journal-title":"IEEE Netw"},{"key":"16406_CR15","doi-asserted-by":"publisher","first-page":"3850","DOI":"10.1109\/JIOT.2021.3100797","volume":"9","author":"MJ Islam","year":"2021","unstructured":"Islam MJ, Rahman A, Kabir S, Karim MR, Acharjee UK, Nasir MK, Wu S (2021) Blockchain-SDN-based energy-aware and distributed secure architecture for IoT in smart cities. IEEE Internet Things J 9:3850\u20133864","journal-title":"IEEE Internet Things J"},{"issue":"8","key":"16406_CR16","doi-asserted-by":"publisher","first-page":"5110","DOI":"10.1109\/TII.2019.2957140","volume":"16","author":"M Keshk","year":"2019","unstructured":"Keshk M, Turnbull B, Moustafa N, Vatsalan D, Choo KKR (2019) A privacy-preserving-framework-based blockchain and deep learning for protecting smart power networks. IEEE Trans Ind Inf 16(8):5110\u20135118","journal-title":"IEEE Trans Ind Inf"},{"key":"16406_CR17","doi-asserted-by":"publisher","first-page":"74802","DOI":"10.1109\/ACCESS.2021.3080180","volume":"9","author":"HJ Kim","year":"2021","unstructured":"Kim HJ, Baek JW, Chung K (2021) Associative knowledge graph using fuzzy clustering and min-max normalization in video contents. IEEE Access 9:74802\u201374816","journal-title":"IEEE Access"},{"key":"16406_CR18","doi-asserted-by":"publisher","first-page":"2326","DOI":"10.1109\/TNSE.2021.3089435","volume":"8","author":"P Kumar","year":"2021","unstructured":"Kumar P, Kumar R, Srivastava G, Gupta GP, Tripathi R, Gadekallu TR, Xiong NN (2021) PPSF: a privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities. IEEE Tran Netw Sci Eng 8:2326\u20132341","journal-title":"IEEE Tran Netw Sci Eng"},{"key":"16406_CR19","doi-asserted-by":"publisher","first-page":"101954","DOI":"10.1016\/j.sysarc.2020.101954","volume":"115","author":"P Kumar","year":"2021","unstructured":"Kumar P, Gupta GP, Tripathi R (2021) TP2SF: a trustworthy privacy-preserving secured framework for sustainable smart cities by leveraging blockchain and machine learning. J Syst Archit 115:101954","journal-title":"J Syst Archit"},{"key":"16406_CR20","first-page":"1","volume-title":"2022 14th international conference on COMmunication systems & NETworkS (COMSNETS)","author":"PM Kumar","year":"2022","unstructured":"Kumar PM, Rawal B, Gao J (2022) Blockchain-enabled privacy preserving of IoT data for sustainable smart cities using machine learning. In: 2022 14th international conference on COMmunication systems & NETworkS (COMSNETS). IEEE, pp 1\u20136"},{"key":"16406_CR21","doi-asserted-by":"publisher","first-page":"103007","DOI":"10.1016\/j.jnca.2021.103007","volume":"181","author":"U Majeed","year":"2021","unstructured":"Majeed U, Khan LU, Yaqoob I, Kazmi SA, Salah K, Hong CS (2021) Blockchain for IoT-based smart cities: recent advances, requirements and future challenges. J Netw Comput Appl 181:103007","journal-title":"J Netw Comput Appl"},{"key":"16406_CR22","doi-asserted-by":"publisher","first-page":"2533","DOI":"10.1007\/s00521-018-3937-8","volume":"32","author":"S Malakar","year":"2020","unstructured":"Malakar S, Ghosh M, Bhowmik S, Sarkar R, Nasipuri M (2020) A GA based hierarchical feature selection approach for handwritten word recognition. Neural Comput & Applic 32:2533\u20132552","journal-title":"Neural Comput & Applic"},{"key":"16406_CR23","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.neucom.2018.04.045","volume":"308","author":"G Rao","year":"2018","unstructured":"Rao G, Huang W, Feng Z, Cong Q (2018) LSTM with sentence representations for document-level sentiment classification. Neurocomputing 308:49\u201357","journal-title":"Neurocomputing"},{"key":"16406_CR24","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.jnca.2019.06.019","volume":"143","author":"S Rathore","year":"2019","unstructured":"Rathore S, Kwon BW, Park JH (2019) BlockSecIoTNet Blockchain-based decentralized security architecture for IoT network. J Netw Comput Appl 143:167\u2013177","journal-title":"J Netw Comput Appl"},{"key":"16406_CR25","first-page":"21","volume":"11","author":"MM Salim","year":"2021","unstructured":"Salim MM, Shanmuganathan V, Loia V, Park JH (2021) Deep learning enabled secure IoT handover authentication for blockchain networks. Hum Cent Comput Inf Sci 11:21","journal-title":"Hum Cent Comput Inf Sci"},{"key":"16406_CR26","doi-asserted-by":"publisher","first-page":"102909","DOI":"10.1016\/j.jnca.2020.102909","volume":"175","author":"W Serrano","year":"2021","unstructured":"Serrano W (2021) The blockchain random neural network for cybersecure IoT and 5G infrastructure in smart cities. J Netw Comput Appl 175:102909","journal-title":"J Netw Comput Appl"},{"key":"16406_CR27","doi-asserted-by":"publisher","first-page":"102252","DOI":"10.1016\/j.scs.2020.102252","volume":"60","author":"SK Singh","year":"2020","unstructured":"Singh SK, Jeong YS, Park JH (2020) A deep learning-based IoT-oriented infrastructure for secure smart city. Sustain Cities Soc 60:102252","journal-title":"Sustain Cities Soc"},{"key":"16406_CR28","first-page":"12","volume":"11","author":"SK Singh","year":"2021","unstructured":"Singh SK, Azzaoui AE, Kim TW, Pan Y, Park JH (2021) DeepBlockScheme: a deep learning-based blockchain driven scheme for secure smart city. Hum-Centric Comput Inf Sci 11:12","journal-title":"Hum-Centric Comput Inf Sci"},{"key":"16406_CR29","unstructured":"UNSW_NB15: https:\/\/www.kaggle.com\/datasets\/mrwellsdavid\/unsw-nb15?select=UNSW-NB15_2.csv. Accessed 15 July 2022"},{"key":"16406_CR30","doi-asserted-by":"publisher","first-page":"2662","DOI":"10.3390\/electronics10212662","volume":"10","author":"H Vargas","year":"2021","unstructured":"Vargas H, Lozano-Garzon C, Montoya GA, Donoso Y (2021) Detection of security attacks in industrial IoT networks: a blockchain and machine learning approach. Electronics 10:2662","journal-title":"Electronics"},{"key":"16406_CR31","doi-asserted-by":"publisher","unstructured":"Karthick S (2018) TDP: A Novel Secure and Energy Aware Routing Protocol for Wireless Sensor Networks. International Journal of Intelligent Engineering and Systems 11(2):76-84. https:\/\/doi.org\/10.22266\/ijies2018.0430.09","DOI":"10.22266\/ijies2018.0430.09"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16406-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-16406-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16406-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T13:21:02Z","timestamp":1708608062000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-16406-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,7]]},"references-count":31,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["16406"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-16406-6","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,7]]},"assertion":[{"value":"17 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 June 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 August 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This article is a completely original work of its authors; it has not been published before and will not be sent to other publications until the journal\u2019s editorial board decides not to accept it for publication.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declared that they have no conflicts of interest to this work. We declare that we do not have any commercial or associative interest that represents a conflict of interest in connection with the work submitted.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}