{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:40:09Z","timestamp":1758987609463,"version":"3.44.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T00:00:00Z","timestamp":1746662400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T00:00:00Z","timestamp":1746662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100006579","name":"Ministry of Industry and Information Technology of the People\u2019s Republic of China","doi-asserted-by":"publisher","award":["TC200H01N"],"award-info":[{"award-number":["TC200H01N"]}],"id":[{"id":"10.13039\/501100006579","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-01977-y","type":"journal-article","created":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T03:38:15Z","timestamp":1746675495000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Reinforcement learning-driven temporal knowledge graph reasoning for secure data provenance in distributed networks"],"prefix":"10.1007","volume":"18","author":[{"given":"Yunxiang","family":"Qiu","sequence":"first","affiliation":[]},{"given":"Yuting","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Liangguo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Shuyu","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Xingshu","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,8]]},"reference":[{"key":"1977_CR1","doi-asserted-by":"publisher","unstructured":"Al-Mamun A, Yan F, Zhao D (2021) Scichain: Blockchain-enabled lightweight and efficient data provenance for reproducible scientific computing. In: 2021 IEEE 37th international conference on data engineering (ICDE), pp 1853\u20131858. https:\/\/doi.org\/10.1109\/ICDE51399.2021.00166","DOI":"10.1109\/ICDE51399.2021.00166"},{"issue":"7","key":"1977_CR2","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1038\/s44287-024-00053-6","volume":"1","author":"L Ale","year":"2024","unstructured":"Ale L, Zhang N, King SA et al (2024) Empowering generative ai through mobile edge computing. Nat Rev Electric Eng 1(7):478\u2013486. https:\/\/doi.org\/10.1038\/s44287-024-00053-6","journal-title":"Nat Rev Electric Eng"},{"issue":"1","key":"1977_CR3","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1080\/1206212X.2018.1501937","volume":"43","author":"W Ametepe","year":"2021","unstructured":"Ametepe W, Wang C, Ocansey SK et al (2021) Data provenance collection and security in a distributed environment: a survey. Int J Comput Appl 43(1):11\u201325. https:\/\/doi.org\/10.1080\/1206212X.2018.1501937","journal-title":"Int J Comput Appl"},{"key":"1977_CR4","doi-asserted-by":"publisher","unstructured":"Awan S, Li F, Luo B, et\u00a0al (2019) Poster: A reliable and accountable privacy-preserving federated learning framework using the blockchain. Ass Comput Mach, New York, NY, USA, CCS \u201919, p 2561\u20132563, https:\/\/doi.org\/10.1145\/3319535.3363256","DOI":"10.1145\/3319535.3363256"},{"issue":"4","key":"1977_CR5","doi-asserted-by":"publisher","first-page":"3614","DOI":"10.1109\/TITS.2023.3236274","volume":"24","author":"G Bendiab","year":"2023","unstructured":"Bendiab G, Hameurlaine A, Germanos G et al (2023) Autonomous vehicles security: Challenges and solutions using blockchain and artificial intelligence. IEEE Trans Intell Transport Syst 24(4):3614\u20133637. https:\/\/doi.org\/10.1109\/TITS.2023.3236274","journal-title":"IEEE Trans Intell Transport Syst"},{"key":"1977_CR6","doi-asserted-by":"publisher","unstructured":"Bordes A, Usunier N, Garcia-Duran A et al (2013) Translating embeddings for modeling multi-relational data. Adv Neural Inf Process Syst 26. https:\/\/doi.org\/10.5555\/2999792.2999923","DOI":"10.5555\/2999792.2999923"},{"issue":"18","key":"1977_CR7","doi-asserted-by":"publisher","first-page":"13849","DOI":"10.1109\/JIOT.2021.3088875","volume":"8","author":"Z Chang","year":"2021","unstructured":"Chang Z, Liu S, Xiong X et al (2021) A survey of recent advances in edge-computing-powered artificial intelligence of things. IEEE Internet of Things J 8(18):13849\u201313875. https:\/\/doi.org\/10.1109\/JIOT.2021.3088875","journal-title":"IEEE Internet of Things J"},{"issue":"1","key":"1977_CR8","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1109\/TII.2020.3045161","volume":"18","author":"D Chen","year":"2022","unstructured":"Chen D, Zhao Z, Qin X et al (2022) Magleak: A learning-based side-channel attack for password recognition with multiple sensors in iiot environment. IEEE Trans Indust Inf 18(1):467\u2013476. https:\/\/doi.org\/10.1109\/TII.2020.3045161","journal-title":"IEEE Trans Indust Inf"},{"key":"1977_CR9","doi-asserted-by":"publisher","unstructured":"Chen W, Liang X, Li J, et\u00a0al (2018) Blockchain based provenance sharing of scientific workflows. In: 2018 IEEE international conference on big data (Big Data), pp 3814\u20133820. https:\/\/doi.org\/10.1109\/BigData.2018.8622237","DOI":"10.1109\/BigData.2018.8622237"},{"issue":"1","key":"1977_CR10","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1109\/COMST.2022.3218527","volume":"25","author":"S Duan","year":"2022","unstructured":"Duan S, Wang D, Ren J et al (2022) Distributed artificial intelligence empowered by end-edge-cloud computing: A survey. IEEE Commun Surv Tutor 25(1):591\u2013624. https:\/\/doi.org\/10.1109\/COMST.2022.3218527","journal-title":"IEEE Commun Surv Tutor"},{"key":"1977_CR11","doi-asserted-by":"publisher","unstructured":"Garcia RD, Sankar\u00a0Ramachandran G, Jurdak R, et\u00a0al (2022) A blockchain-based data governance with privacy and provenance: a case study for e-prescription. In: 2022 IEEE international conference on blockchain and cryptocurrency (ICBC), pp 1\u20135. https:\/\/doi.org\/10.1109\/ICBC54727.2022.9805545","DOI":"10.1109\/ICBC54727.2022.9805545"},{"key":"1977_CR12","doi-asserted-by":"publisher","unstructured":"Garcia-Duran A, Duman\u010di\u0107 S, Niepert M (2018) Learning sequence encoders for temporal knowledge graph completion. In: Proceedings of the 2018 conference on empirical methods in natural language processing, pp 4816\u20134821. https:\/\/doi.org\/10.18653\/v1\/D18-1516","DOI":"10.18653\/v1\/D18-1516"},{"key":"1977_CR13","doi-asserted-by":"publisher","unstructured":"Goel R, Kazemi SM, Brubaker M, et\u00a0al (2020) Diachronic embedding for temporal knowledge graph completion. In: Proceedings of the AAAI conference on artificial intelligence, pp 3988\u20133995. https:\/\/doi.org\/10.1609\/aaai.v34i04.5815","DOI":"10.1609\/aaai.v34i04.5815"},{"key":"1977_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3457538","author":"S Gu","year":"2024","unstructured":"Gu S, Yang L, Du Y et al (2024) A review of safe reinforcement learning: Methods, theories and applications. IEEE Trans Pattern Anal Mach Intell. https:\/\/doi.org\/10.1109\/TPAMI.2024.3457538","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"1977_CR15","doi-asserted-by":"publisher","unstructured":"Hogan A, Blomqvist E, Cochez M, et\u00a0al (2021) Knowledge graphs. ACM Comput Surv 54(4). https:\/\/doi.org\/10.1145\/3447772","DOI":"10.1145\/3447772"},{"key":"1977_CR16","doi-asserted-by":"publisher","unstructured":"Leblay J, Chekol MW (2018) Deriving validity time in knowledge graph. p 1771\u20131776. https:\/\/doi.org\/10.1145\/3184558.3191639","DOI":"10.1145\/3184558.3191639"},{"key":"1977_CR17","doi-asserted-by":"publisher","first-page":"9368","DOI":"10.1109\/ACCESS.2018.2890432","volume":"7","author":"X Li","year":"2019","unstructured":"Li X, Wang Q, Lan X et al (2019) Enhancing cloud-based iot security through trustworthy cloud service: An integration of security and reputation approach. IEEE Access 7:9368\u20139383. https:\/\/doi.org\/10.1109\/ACCESS.2018.2890432","journal-title":"IEEE Access"},{"key":"1977_CR18","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.comcom.2024.05.010","volume":"223","author":"X Li","year":"2024","unstructured":"Li X, Xiao P, Tang D et al (2024) Uavs-assisted qos guarantee scheme of iot applications for reliable mobile edge computing. Comput Commun 223:55\u201367. https:\/\/doi.org\/10.1016\/j.comcom.2024.05.010","journal-title":"Comput Commun"},{"key":"1977_CR19","doi-asserted-by":"publisher","unstructured":"Lin Y, Liu Z, Sun M, et\u00a0al (2015) Learning entity and relation embeddings for knowledge graph completion. In: Proceedings of the AAAI conference on artificial intelligence. https:\/\/doi.org\/10.5555\/2886521.2886624","DOI":"10.5555\/2886521.2886624"},{"issue":"4","key":"1977_CR20","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1007\/s10115-022-01664-x","volume":"64","author":"J Liu","year":"2022","unstructured":"Liu J, Huang J, Zhou Y et al (2022) From distributed machine learning to federated learning: A survey. Knowl Inf Syst 64(4):885\u2013917. https:\/\/doi.org\/10.1007\/s10115-022-01664-x","journal-title":"Knowl Inf Syst"},{"issue":"4","key":"1977_CR21","doi-asserted-by":"publisher","first-page":"3276","DOI":"10.1109\/JIOT.2022.3144450","volume":"10","author":"SK Lo","year":"2023","unstructured":"Lo SK, Liu Y, Lu Q et al (2023) Toward trustworthy ai: Blockchain-based architecture design for accountability and fairness of federated learning systems. IEEE Internet of Things J 10(4):3276\u20133284. https:\/\/doi.org\/10.1109\/JIOT.2022.3144450","journal-title":"IEEE Internet of Things J"},{"key":"1977_CR22","doi-asserted-by":"publisher","unstructured":"Margheri A, Masi M, Miladi A et al (2020) Decentralised provenance for healthcare data. Int J Med Inf 141:104197. https:\/\/doi.org\/10.1016\/j.ijmedinf.2020.104197","DOI":"10.1016\/j.ijmedinf.2020.104197"},{"issue":"7540","key":"1977_CR23","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1038\/nature14236","volume":"518","author":"V Mnih","year":"2015","unstructured":"Mnih V, Kavukcuoglu K, Silver D et al (2015) Human-level control through deep reinforcement learning. Nature 518(7540):529\u2013533. https:\/\/doi.org\/10.1038\/nature14236","journal-title":"Nature"},{"issue":"14s","key":"1977_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3593294","volume":"55","author":"B Pan","year":"2023","unstructured":"Pan B, Stakhanova N, Ray S (2023) Data provenance in security and privacy. ACM Comput Surv 55(14s):1\u201335","journal-title":"ACM Comput Surv"},{"key":"1977_CR25","doi-asserted-by":"publisher","unstructured":"Rong-na X, Hui L, Guo-zhen S et al (2021) Provenance-based data flow control mechanism for internet of things. Trans Emerg Telecommun Technol 32(5):e3934. https:\/\/doi.org\/10.1002\/ett.3934","DOI":"10.1002\/ett.3934"},{"issue":"4","key":"1977_CR26","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MCE.2019.2892222","volume":"8","author":"D Tosh","year":"2019","unstructured":"Tosh D, Shetty S, Liang X et al (2019) Data provenance in the cloud: A blockchain-based approach. IEEE Consum Electron Magaz 8(4):38\u201344. https:\/\/doi.org\/10.1109\/MCE.2019.2892222","journal-title":"IEEE Consum Electron Magaz"},{"issue":"8","key":"1977_CR27","doi-asserted-by":"publisher","first-page":"5992","DOI":"10.1109\/JIOT.2021.3084449","volume":"9","author":"Q Wang","year":"2022","unstructured":"Wang Q, Chen X, Jin X et al (2022) Enhancing trustworthiness of internet of vehicles in space-air-ground-integrated networks: Attestation approach. IEEE Internet of Things J 9(8):5992\u20136002. https:\/\/doi.org\/10.1109\/JIOT.2021.3084449","journal-title":"IEEE Internet of Things J"},{"issue":"4","key":"1977_CR28","doi-asserted-by":"publisher","first-page":"2221","DOI":"10.1007\/s12083-024-01701-2","volume":"17","author":"Q Wang","year":"2024","unstructured":"Wang Q, Xiao P, Li X et al (2024) Taas: Trust assessment as a service for secure communication of green edge-assisted uav network. Peer-tO-Peer Netw Appl 17(4):2221\u20132236. https:\/\/doi.org\/10.1007\/s12083-024-01701-2","journal-title":"Peer-tO-Peer Netw Appl"},{"key":"1977_CR29","doi-asserted-by":"crossref","unstructured":"Wang Z, Zhang J, Feng J, et\u00a0al (2014) Knowledge graph embedding by translating on hyperplanes. In: Proceedings of the AAAI conference on artificial intelligence","DOI":"10.1609\/aaai.v28i1.8870"},{"key":"1977_CR30","doi-asserted-by":"crossref","unstructured":"Wu C, Zhang L, Xu L, et\u00a0al (2024) Privacy-preserving serverless federated learning scheme for internet of things. IEEE Internet of Things J","DOI":"10.1109\/JIOT.2024.3380597"},{"key":"1977_CR31","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/j.future.2022.10.029","volume":"144","author":"H Xue","year":"2023","unstructured":"Xue H, Chen D, Zhang N et al (2023) Integration of blockchain and edge computing in internet of things: A survey. Future Gener Comput Syst 144:307\u2013326. https:\/\/doi.org\/10.1016\/j.future.2022.10.029","journal-title":"Future Gener Comput Syst"},{"key":"1977_CR32","doi-asserted-by":"crossref","unstructured":"Zhang Y, Kong X, Shen Z, et\u00a0al (2024) A survey on temporal knowledge graph embedding: Models and applications. Knowl-Based Syst p 112454","DOI":"10.1016\/j.knosys.2024.112454"},{"key":"1977_CR33","doi-asserted-by":"publisher","unstructured":"Zhao X, Jiang R, Han Y et al (2024) A survey on cybersecurity knowledge graph construction. Comput Secur 136:103524. https:\/\/doi.org\/10.1016\/j.cose.2023.103524","DOI":"10.1016\/j.cose.2023.103524"},{"issue":"10","key":"1977_CR34","doi-asserted-by":"publisher","first-page":"1896","DOI":"10.1109\/TKDE.2020.2983653","volume":"34","author":"Y Zhou","year":"2020","unstructured":"Zhou Y, Wang Z, Sun M (2020) A survey on temporal knowledge graphs: Representation learning and applications. IEEE Trans Knowl Data Eng 34(10):1896\u20131915. https:\/\/doi.org\/10.1109\/TKDE.2020.2983653","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1977_CR35","doi-asserted-by":"publisher","unstructured":"Zhu C, Chen M, Fan C, et\u00a0al (2021) Learning from history: Modeling temporal knowledge graphs with sequential copy-generation networks. In: Proceedings of the AAAI conference on artificial intelligence, pp 4732\u20134740. https:\/\/doi.org\/10.1609\/aaai.v35i5.16604","DOI":"10.1609\/aaai.v35i5.16604"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01977-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01977-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01977-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:22:45Z","timestamp":1758986565000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01977-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,8]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["1977"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01977-y","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,5,8]]},"assertion":[{"value":"14 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}}],"article-number":"169"}}