{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:29:36Z","timestamp":1771064976983,"version":"3.50.1"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-02048-y","type":"journal-article","created":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T06:29:21Z","timestamp":1752301761000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The future of misinformation control: integrating advanced algorithms and Blockchain for effective Deepfake detection"],"prefix":"10.1007","volume":"18","author":[{"given":"Shiyou","family":"Xu","sequence":"first","affiliation":[]},{"given":"Xiong","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zhanghuang","family":"Xie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,12]]},"reference":[{"issue":"1","key":"2048_CR1","first-page":"1","volume":"24","author":"M Darbandi","year":"2017","unstructured":"Darbandi M (2017) Proposing new intelligent system for suggesting better service providers in cloud computing based on Kalman filtering. Int J Technol Innov Res, (ISSN: 2321-1814) 24(1):1\u20139","journal-title":"Int J Technol Innov Res"},{"issue":"1","key":"2048_CR2","first-page":"11","volume":"5","author":"M Darbandi","year":"2017","unstructured":"Darbandi M (2017) Proposing new intelligence algorithm for suggesting better services to cloud users based on Kalman filtering. J Comput Sci Appl 5(1):11\u201316","journal-title":"J Comput Sci Appl"},{"key":"2048_CR3","doi-asserted-by":"crossref","unstructured":"Aloke, E.J. and Abah, J., 2024. Enhancing the fight against social Media Misinformation: An Ensemble Deep Learning Framework for Detecting Deepfakes","DOI":"10.5120\/ijais2023451952"},{"issue":"1","key":"2048_CR4","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1186\/s12859-023-05465-z","volume":"24","author":"K Abnoosian","year":"2023","unstructured":"Abnoosian K, Farnoosh R, Behzadi MH (2023) Prediction of diabetes disease using an ensemble of machine learning multi-classifier models. BMC Bioinformatics 24(1):337","journal-title":"BMC Bioinformatics"},{"issue":"1","key":"2048_CR5","first-page":"10","volume":"23","author":"M Darbandi","year":"2017","unstructured":"Darbandi M (2017) Kalman filtering for estimation and prediction servers with lower traffic loads for transferring high-level processes in cloud computing. Int J Technol Innov Res,(ISSN: 2321-1814) 23(1):10\u201320","journal-title":"Int J Technol Innov Res"},{"issue":"1","key":"2048_CR6","doi-asserted-by":"publisher","first-page":"89","DOI":"10.3390\/jcp2010007","volume":"2","author":"M Taeb","year":"2022","unstructured":"Taeb M, Chi H (2022) Comparison of deepfake detection techniques through deep learning. J Cybersecur Priv 2(1):89\u2013106. https:\/\/doi.org\/10.3390\/jcp2010007","journal-title":"J Cybersecur Priv"},{"issue":"1","key":"2048_CR7","doi-asserted-by":"publisher","first-page":"4023","DOI":"10.1038\/s41598-025-86658-9","volume":"15","author":"M Natarajan","year":"2025","unstructured":"Natarajan M, Bharathi A, Varun CS, Selvarajan S (2025) Quantum secure patient login credential system using blockchain for electronic health record sharing framework. Sci Rep 15(1):4023","journal-title":"Sci Rep"},{"issue":"19","key":"2048_CR8","doi-asserted-by":"publisher","first-page":"9820","DOI":"10.3390\/app12199820","volume":"12","author":"A Raza","year":"2022","unstructured":"Raza A, Munir K, Almutairi M (2022) A novel deep learning approach for deepfake image detection. Appl Sci 12(19):9820. https:\/\/doi.org\/10.3390\/app12199820","journal-title":"Appl Sci"},{"key":"2048_CR9","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1109\/IIAI-AAI53430.2021.00079","volume-title":"In 2021 10th international congress on advanced applied informatics (IIAI-AAI)","author":"MS Rana","year":"2021","unstructured":"Rana MS, Murali B, Sung AH (2021, July) Deepfake detection using machine learning algorithms. In: In 2021 10th international congress on advanced applied informatics (IIAI-AAI). IEEE, pp 458\u2013463. https:\/\/doi.org\/10.1109\/IIAI-AAI53430.2021.00079"},{"issue":"2","key":"2048_CR10","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1080\/23738871.2020.1797135","volume":"5","author":"C Whyte","year":"2020","unstructured":"Whyte C (2020) Deepfake news: AI-enabled disinformation as a multi-level public policy challenge. J Cyber Policy 5(2):199\u2013217. https:\/\/doi.org\/10.1080\/23738871.2020.1797135","journal-title":"J Cyber Policy"},{"key":"2048_CR11","volume-title":"Proceedings of the international conference on scientific computing (CSC) (p. 1)","author":"M Darbandi","year":"2012","unstructured":"Darbandi M, Abedi M, Fard S, Nakhodchi S (2012) Involving Kalman filter technique for increasing the reliability and efficiency of cloud computing. In: Proceedings of the international conference on scientific computing (CSC) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp)"},{"issue":"1","key":"2048_CR12","doi-asserted-by":"publisher","first-page":"87","DOI":"10.3390\/electronics12010087","volume":"12","author":"JB Awotunde","year":"2022","unstructured":"Awotunde JB, Jimoh RG, Imoize AL, Abdulrazaq AT, Li CT, Lee CC (2022) An enhanced deep learning-based deepfake video detection and classification system. Electronics 12(1):87. https:\/\/doi.org\/10.3390\/electronics12010087","journal-title":"Electronics"},{"key":"2048_CR13","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/IC3IoT.2018.8668119","volume-title":"2018 international conference on communication, computing and internet of things (IC3IoT)","author":"M Darbandi","year":"2018","unstructured":"Darbandi M, Haghgoo S, Hajiali M, Khabir A (2018) Prediction and estimation of next demands of cloud users based on their comments in CRM and previous usages. In: 2018 international conference on communication, computing and internet of things (IC3IoT). IEEE, pp 81\u201386"},{"issue":"2","key":"2048_CR14","doi-asserted-by":"publisher","first-page":"125","DOI":"10.34172\/jhbmi.2023.19","volume":"10","author":"K Abnoosian","year":"2023","unstructured":"Abnoosian K, Farnoosh R, Behzadi MH (2023) A pipeline-based framework for early prediction of diabetes. J Health & Biomed Inform 10(2):125\u2013140","journal-title":"J Health & Biomed Inform"},{"issue":"2","key":"2048_CR15","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MITP.2020.2977589","volume":"22","author":"P Fraga-Lamas","year":"2020","unstructured":"Fraga-Lamas P, Fernandez-Carames TM (2020) Fake news, disinformation, and deepfakes: leveraging distributed ledger technologies and blockchain to combat digital deception and counterfeit reality. IT Prof 22(2):53\u201359. https:\/\/doi.org\/10.1109\/MITP.2020.2977589","journal-title":"IT Prof"},{"issue":"1","key":"2048_CR16","doi-asserted-by":"publisher","first-page":"7287","DOI":"10.1038\/s41598-025-91856-6","volume":"15","author":"S Selvarajan","year":"2025","unstructured":"Selvarajan S, Manoharan H, Abdelhaq M, Khadidos AO, Khadidos AO, Alsaqour R, Uddin M (2025) Diagnostic behavior analysis of profuse data intrusions in cyber physical systems using adversarial learning techniques. Sci Rep 15(1):7287","journal-title":"Sci Rep"},{"key":"2048_CR17","doi-asserted-by":"publisher","unstructured":"Heidari A, Navimipour NJ, Dag H, Talebi S, Unal M (2024) A novel blockchain-based deepfake detection method using federated and deep learning models. Cogn Comput:1\u201319. https:\/\/doi.org\/10.1007\/s12559-024-10255-7","DOI":"10.1007\/s12559-024-10255-7"},{"issue":"7","key":"2048_CR18","doi-asserted-by":"publisher","first-page":"3466","DOI":"10.1007\/s13198-024-02354-3","volume":"15","author":"R Farnoosh","year":"2024","unstructured":"Farnoosh R, Abnoosian K (2024) A robust innovative pipeline-based machine learning framework for predicting COVID-19 in Mexican patients. Int J Syst Assur Eng Manag 15(7):3466\u20133484","journal-title":"Int J Syst Assur Eng Manag"},{"key":"2048_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-33-6835-4_44","volume-title":"Advances in cyber security: second international conference, ACeS 2020, Penang, Malaysia, December 8-9, 2020, revised selected papers 2 (pp. 674-684)","author":"TW Jing","year":"2021","unstructured":"Jing TW, Murugesan RK (2021) Protecting data privacy and preventing fake news and Deepfakes in social media via Blockchain technology. In: Advances in cyber security: second international conference, ACeS 2020, Penang, Malaysia, December 8-9, 2020, revised selected papers 2 (pp. 674-684). Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-33-6835-4_44"},{"issue":"4","key":"2048_CR20","doi-asserted-by":"publisher","first-page":"2122","DOI":"10.3390\/app13042122","volume":"13","author":"N Choi","year":"2023","unstructured":"Choi N, Kim H (2023) DDS: deepfake detection system through collective intelligence and deep-learning model in a blockchain environment. Appl Sci 13(4):2122. https:\/\/doi.org\/10.3390\/app13042122","journal-title":"Appl Sci"},{"issue":"1","key":"2048_CR21","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/s13278-022-00941-5","volume":"12","author":"CC Chen","year":"2022","unstructured":"Chen CC, Du Y, Peter R, Golab W (2022) An implementation of fake news prevention by blockchain and entropy-based incentive mechanism. Soc Netw Anal Min 12(1):114. https:\/\/doi.org\/10.1007\/s13278-022-00941-5","journal-title":"Soc Netw Anal Min"},{"key":"2048_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/info16010005","volume":"16","author":"S Selvarajan","year":"2025","unstructured":"Selvarajan S, Manoharan H, Khadidos AO (2025) QCA: quantum computational approach for internet of things with 5G connectivity. Information 16:1\u201325. https:\/\/doi.org\/10.3390\/info16010005","journal-title":"Information"},{"issue":"1","key":"2048_CR23","doi-asserted-by":"publisher","first-page":"5912","DOI":"10.1038\/s41598-025-89249-w","volume":"15","author":"F Khan","year":"2025","unstructured":"Khan F, Amanullah SI, Selvarajan S (2025) Linear regressive weighted Gaussian kernel liquid neural network for brain tumor disease prediction using time series data. Sci Rep 15(1):5912","journal-title":"Sci Rep"},{"key":"2048_CR24","doi-asserted-by":"publisher","first-page":"1494174","DOI":"10.3389\/fcomp.2024.1494174","volume":"6","author":"S Fuladi","year":"2025","unstructured":"Fuladi S, Ruby D, Manikandan N, Verma A, Nallakaruppan MK, Selvarajan S et al (2025) A reliable and privacy-preserved federated learning framework for real-time smoking prediction in healthcare. Front Comput Sci 6:1494174","journal-title":"Front Comput Sci"},{"key":"2048_CR25","doi-asserted-by":"publisher","first-page":"100666","DOI":"10.1016\/j.cosrev.2024.100666","volume":"54","author":"Z Amiri","year":"2024","unstructured":"Amiri Z, Heidari A, Jafari N, Hosseinzadeh M (2024) Deep study on autonomous learning techniques for complex pattern recognition in interconnected information systems. Comput Sci Rev 54:100666","journal-title":"Comput Sci Rev"},{"issue":"8","key":"2048_CR26","doi-asserted-by":"publisher","first-page":"22909","DOI":"10.1007\/s11042-023-16382-x","volume":"83","author":"Z Amiri","year":"2024","unstructured":"Amiri Z, Heidari A, Navimipour NJ, Unal M, Mousavi A (2024) Adventures in data analysis: a systematic review of deep learning techniques for pattern recognition in cyber-physical-social systems. Multimed Tools Appl 83(8):22909\u201322973","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"2048_CR27","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1007\/s12559-024-10255-7","volume":"16","author":"A Heidari","year":"2024","unstructured":"Heidari A, Navimipour NJ, Dag H, Talebi S, Unal M (2024) A novel blockchain-based deepfake detection method using federated and deep learning models. Cogn Comput 16(3):1073\u20131091","journal-title":"Cogn Comput"},{"issue":"4","key":"2048_CR28","doi-asserted-by":"publisher","first-page":"99","DOI":"10.3390\/computers13040099","volume":"13","author":"A Al-Adwan","year":"2024","unstructured":"Al-Adwan A, Alazzam H, Al-Anbaki N, Alduweib E (2024) Detection of Deepfake media using a hybrid CNN\u2013RNN model and particle swarm optimization (PSO) Algorithm. Computers 13(4):99. https:\/\/doi.org\/10.3390\/computers13040099","journal-title":"Computers"},{"key":"2048_CR29","doi-asserted-by":"publisher","first-page":"123471","DOI":"10.1016\/j.techfore.2024.123471","volume":"205","author":"S Saif","year":"2024","unstructured":"Saif S, Tehseen S, Ali SS (2024) Fake news or real? Detecting deepfake videos using geometric facial structure and graph neural network. Technol Forecast Soc Chang 205:123471. https:\/\/doi.org\/10.1016\/j.techfore.2024.123471","journal-title":"Technol Forecast Soc Chang"},{"issue":"2","key":"2048_CR30","doi-asserted-by":"publisher","first-page":"966","DOI":"10.1108\/ITP-10-2020-0699","volume":"37","author":"A Ghai","year":"2024","unstructured":"Ghai A, Kumar P, Gupta S (2024) A deep-learning-based image forgery detection framework for controlling the spread of misinformation. Inf Technol People 37(2):966\u2013997. https:\/\/doi.org\/10.1108\/ITP-10-2020-0699","journal-title":"Inf Technol People"},{"issue":"2","key":"2048_CR31","doi-asserted-by":"publisher","first-page":"e1520","DOI":"10.1002\/widm.1520","volume":"14","author":"A Heidari","year":"2024","unstructured":"Heidari A, Jafari Navimipour N, Dag H, Unal M (2024) Deepfake detection using deep learning methods: a systematic and comprehensive review. Wiley Interdiscip Rev: Data Min Knowl Disc 14(2):e1520. https:\/\/doi.org\/10.1002\/widm.1520","journal-title":"Wiley Interdiscip Rev: Data Min Knowl Disc"},{"key":"2048_CR32","doi-asserted-by":"publisher","first-page":"100502","DOI":"10.1016\/j.eij.2024.100502","volume":"27","author":"AA Khan","year":"2024","unstructured":"Khan AA, Chen YL, Hajjej F, Shaikh AA, Yang J, Ku CS, Por LY (2024) Digital forensics for the socio-cyber world (DF-SCW): a novel framework for deepfake multimedia investigation on social media platforms. Egypt Inform J 27:100502. https:\/\/doi.org\/10.1016\/j.eij.2024.100502","journal-title":"Egypt Inform J"},{"issue":"6","key":"2048_CR33","doi-asserted-by":"publisher","first-page":"752","DOI":"10.1007\/s42979-024-03105-8","volume":"5","author":"N Kumar","year":"2024","unstructured":"Kumar N, Kundu A (2024) Cyber security focused Deepfake detection system using big data. SN Comput Sci 5(6):752. https:\/\/doi.org\/10.1007\/s42979-024-03105-8","journal-title":"SN Comput Sci"},{"issue":"3","key":"2048_CR34","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1109\/TBIOM.2021.3065735","volume":"3","author":"B Han","year":"2021","unstructured":"Han B, Han X, Zhang H, Li J, Cao X (2021) Fighting fake news: two stream network for deepfake detection via learnable SRM. IEEE Trans Biom Behav Identity Sci 3(3):320\u2013331. https:\/\/doi.org\/10.1109\/TBIOM.2021.3065735","journal-title":"IEEE Trans Biom Behav Identity Sci"},{"issue":"8","key":"2048_CR35","doi-asserted-by":"publisher","first-page":"e13570","DOI":"10.1111\/exsy.13570","volume":"41","author":"LA Passos","year":"2024","unstructured":"Passos LA, Jodas D, Costa KA, Souza J\u00fanior LA, Rodrigues D, Del Ser J, Camacho D, Papa JP (2024) A review of deep learning-based approaches for deepfake content detection. Expert Syst 41(8):e13570. https:\/\/doi.org\/10.1111\/exsy.13570","journal-title":"Expert Syst"},{"issue":"9","key":"2048_CR36","doi-asserted-by":"publisher","first-page":"1662","DOI":"10.3390\/electronics13091662","volume":"13","author":"OAHH Al-Dulaimi","year":"2024","unstructured":"Al-Dulaimi OAHH, Kurnaz S (2024) A hybrid CNN-LSTM approach for precision deepfake image detection based on transfer learning. Electronics 13(9):1662. https:\/\/doi.org\/10.3390\/electronics13091662","journal-title":"Electronics"},{"key":"2048_CR37","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI47803.2020.9308428","volume-title":"2020 IEEE symposium series on computational intelligence (SSCI) (pp. 1866-1871)","author":"D Xie","year":"2020","unstructured":"Xie D, Chatterjee P, Liu Z, Roy K, Kossi E (2020) Deepfake detection on publicly available datasets using modified AlexNet. In: 2020 IEEE symposium series on computational intelligence (SSCI) (pp. 1866-1871). IEEE. https:\/\/doi.org\/10.1109\/SSCI47803.2020.9308428"},{"issue":"1","key":"2048_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-024-06782-7","volume":"81","author":"AA Khan","year":"2025","unstructured":"Khan AA, Laghari AA, Baqasah AM, Bacarra R, Alroobaea R, Alsafyani M, Alsayaydeh JAJ (2025) BDLT-IoMT-a novel architecture: SVM machine learning for robust and secure data processing in internet of medical things with blockchain cybersecurity. J Supercomput 81(1):1\u201322","journal-title":"J Supercomput"},{"key":"2048_CR39","doi-asserted-by":"publisher","first-page":"109838","DOI":"10.1016\/j.engappai.2024.109838","volume":"141","author":"AA Khan","year":"2025","unstructured":"Khan AA, Yang J, Laghari AA, Baqasah AM, Alroobaea R, Ku CS et al (2025) BAIoT-EMS: consortium network for small-medium enterprises management system with blockchain and augmented intelligence of things. Eng Appl Artif Intell 141:109838","journal-title":"Eng Appl Artif Intell"},{"key":"2048_CR40","doi-asserted-by":"publisher","first-page":"e1933","DOI":"10.7717\/peerj-cs.1933","volume":"10","author":"A Ayub Khan","year":"2024","unstructured":"Ayub Khan A, Laghari AA, Baqasah AM, Alroobaea R, Almadhor A, Avelino Sampedro G, Kryvinska N (2024) Blockchain-enabled infrastructural security solution for serverless consortium fog and edge computing. PeerJ Comput Sci 10:e1933. https:\/\/doi.org\/10.7717\/peerj-cs.1933","journal-title":"PeerJ Comput Sci"},{"key":"2048_CR41","doi-asserted-by":"publisher","first-page":"100502","DOI":"10.1016\/j.eij.2024.100502","volume":"27","author":"AA Khan","year":"2024","unstructured":"Khan AA, Chen YL, Hajjej F, Shaikh AA, Yang J, Ku CS, Por LY (2024) Digital forensics for the socio-cyber world (DF-SCW): Anovel framework for deepfake multimedia investigation on social media platforms. Egypt Inform J 27:100502","journal-title":"Egypt Inform J"},{"key":"2048_CR42","doi-asserted-by":"publisher","first-page":"1026","DOI":"10.1109\/TGCN.2024.3396454","volume":"8","author":"AA Khan","year":"2024","unstructured":"Khan AA, Laghari AA, Baqasah AM, Alroobaea R, Gadekallu TR, Sampedro GA, Zhu Y (2024) ORAN-B5G: a next generation open radio access network architecture with machine learning for beyond 5G in industrial 5.0. IEEE Trans Green Commun Netw 8:1026\u20131036. https:\/\/doi.org\/10.1109\/TGCN.2024.3396454","journal-title":"IEEE Trans Green Commun Netw"},{"key":"2048_CR43","volume-title":"Secure remote sensing data with Blockchain distributed ledger technology: ASolution for smart cities","author":"AA Khan","year":"2024","unstructured":"Khan AA, Laghari AA, Alroobaea R, Baqasah AM, Alsafyani M, Bacarra R, Alsayaydeh JAJ (2024) Secure remote sensing data with Blockchain distributed ledger technology: ASolution for smart cities. IEEE Access"},{"key":"2048_CR44","doi-asserted-by":"publisher","first-page":"109343","DOI":"10.1016\/j.compeleceng.2024.109343","volume":"118","author":"AA Khan","year":"2024","unstructured":"Khan AA, Dhabi S, Yang J, Alhakami W, Bourouis S, Yee L (2024) B-LPoET: Amiddleware lightweight proof-of-elapsed time (PoET) for efficient distributed transaction execution and security on Blockchain using multithreading technology. Comput Electr Eng 118:109343","journal-title":"Comput Electr Eng"},{"key":"2048_CR45","doi-asserted-by":"publisher","unstructured":"Movassagh AA, Alzubi JA, Gheisari M, Rahimi M, Mohan S, Abbasi AA, Nabipour N (2023) Artificial neural networks training algorithm integrating invasive weed optimization with differential evolutionary model. J Ambient Intell Humaniz Comput\u00a0 14:6017\u20136025. https:\/\/doi.org\/10.1007\/s12652-020-02623-6","DOI":"10.1007\/s12652-020-02623-6"},{"key":"2048_CR46","doi-asserted-by":"publisher","unstructured":"Alzubi OA, Alzubi JA, Al-Zoubi AM, Hassonah MA, Kose U (2022) An efficient malware detection approach with feature weighting based on Harris hawks optimization. Clust Comput Cluster Comput 25:2369\u20132387. https:\/\/doi.org\/10.1007\/s10586-021-03459-1","DOI":"10.1007\/s10586-021-03459-1"},{"issue":"2","key":"2048_CR47","doi-asserted-by":"publisher","first-page":"1363","DOI":"10.1007\/s10586-022-03686-0","volume":"26","author":"OA Alzubi","year":"2023","unstructured":"Alzubi OA, Qiqieh I, Alzubi JA (2023) Fusion of deep learning based cyberattack detection and classification model for intelligent systems. Clust Comput 26(2):1363\u20131374","journal-title":"Clust Comput"},{"issue":"2","key":"2048_CR48","doi-asserted-by":"publisher","first-page":"795","DOI":"10.1007\/s11036-023-02105-x","volume":"28","author":"OA Alzubi","year":"2023","unstructured":"Alzubi OA, Alzubi JA, Alzubi TM, Singh A (2023) Quantum mayfly optimization with encoder-decoder driven LSTM networks for malware detection and classification model. Mob Netw Appl 28(2):795\u2013807","journal-title":"Mob Netw Appl"},{"issue":"16","key":"2048_CR49","doi-asserted-by":"publisher","first-page":"e8091","DOI":"10.1002\/cpe.8091","volume":"36","author":"A Vakili","year":"2024","unstructured":"Vakili A, Al-Khafaji HMR, Darbandi M, Heidari A, Jafari Navimipour N, Unal M (2024) A new service composition method in the cloud-based internet of things environment using a grey wolf optimization algorithm and MapReduce framework. Concurr Comput Pract Exp 36(16):e8091","journal-title":"Concurr Comput Pract Exp"},{"issue":"11","key":"2048_CR50","doi-asserted-by":"publisher","first-page":"5757","DOI":"10.1007\/s00521-023-09366-3","volume":"36","author":"Z Amiri","year":"2024","unstructured":"Amiri Z, Heidari A, Navimipour NJ, Esmaeilpour M, Yazdani Y (2024) The deep learning applications in IoT-based bio-and medical informatics: a systematic literature review. Neural Comput & Applic 36(11):5757\u20135797","journal-title":"Neural Comput & Applic"},{"issue":"2","key":"2048_CR51","first-page":"e1520","volume":"14","author":"A Heidari","year":"2024","unstructured":"Heidari A, Jafari Navimipour N, Dag H, Unal M (2024) Deepfake detection using deep learning methods: a systematic and comprehensive review. Wiley Interdiscip Rev: Data Min Knowl Discov 14(2):e1520","journal-title":"Wiley Interdiscip Rev: Data Min Knowl Discov"},{"issue":"6","key":"2048_CR52","doi-asserted-by":"publisher","first-page":"7521","DOI":"10.1007\/s10586-024-04351-4","volume":"27","author":"A Heidari","year":"2024","unstructured":"Heidari A, Shishehlou H, Darbandi M, Navimipour NJ, Yalcin S (2024) A reliable method for data aggregation on the industrial internet of things using a hybrid optimization algorithm and density correlation degree. Clust Comput 27(6):7521\u20137539","journal-title":"Clust Comput"},{"issue":"10","key":"2048_CR53","doi-asserted-by":"publisher","first-page":"8445","DOI":"10.1109\/JIOT.2023.3237661","volume":"10","author":"A Heidari","year":"2023","unstructured":"Heidari A, Navimipour NJ, Unal M (2023) A secure intrusion detection platform using blockchain and radial basis function neural networks for internet of drones. IEEE Internet Things J 10(10):8445\u20138454","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"2048_CR54","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1007\/s12559-024-10255-7","volume":"16","author":"A Heidari","year":"2024","unstructured":"Heidari A, Navimipour NJ, Dag H, Talebi S, Unal M (2024) A novel blockchain-based deepfake detection method using federated and deep learning models. Cogn Comput 16(3):1073\u20131091","journal-title":"Cogn Comput"},{"issue":"27","key":"2048_CR55","doi-asserted-by":"publisher","first-page":"e8252","DOI":"10.1002\/cpe.8252","volume":"36","author":"A Heidari","year":"2024","unstructured":"Heidari A, Amiri Z, Jamali MAJ, Jafari N (2024) Assessment of reliability and availability of wireless sensor networks in industrial applications by considering permanent faults. Concurr Comput Pract Exp 36(27):e8252","journal-title":"Concurr Comput Pract Exp"},{"issue":"2","key":"2048_CR56","first-page":"e1520","volume":"14","author":"A Heidari","year":"2024","unstructured":"Heidari A, Jafari Navimipour N, Dag H, Unal M (2024) Deepfake detection using deep learning methods: a systematic and comprehensive review. Wiley Interdiscip Rev: Data Min Knowl Discov 14(2):e1520","journal-title":"Wiley Interdiscip Rev: Data Min Knowl Discov"},{"key":"2048_CR57","doi-asserted-by":"publisher","first-page":"132827","DOI":"10.1016\/j.energy.2024.132827","volume":"308","author":"Z Amiri","year":"2024","unstructured":"Amiri Z, Heidari A, Navimipour NJ (2024) Comprehensive survey of artificial intelligence techniques and strategies for climate change mitigation. Energy 308:132827","journal-title":"Energy"},{"issue":"1","key":"2048_CR58","doi-asserted-by":"publisher","first-page":"e13050","DOI":"10.1002\/eng2.13050","volume":"7","author":"A Heidari","year":"2025","unstructured":"Heidari A, Amiri Z, Jamali MAJ, Navimipour NJ (2025) Enhancing solar convection analysis with multi-core processors and GPUs. Eng Rep 7(1):e13050","journal-title":"Eng Rep"},{"issue":"11","key":"2048_CR59","doi-asserted-by":"publisher","first-page":"e5056","DOI":"10.1002\/ett.5056","volume":"35","author":"M Asadi","year":"2024","unstructured":"Asadi M, Jamali MAJ, Heidari A, Navimipour NJ (2024) Botnets unveiled: a comprehensive survey on evolving threats and defense strategies. Trans Emerg Telecommun Technol 35(11):e5056","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"4","key":"2048_CR60","doi-asserted-by":"publisher","first-page":"94","DOI":"10.3390\/technologies10040094","volume":"10","author":"A Heidari","year":"2022","unstructured":"Heidari A, Jafari Navimipour N, Unal M (2022) The history of computing in Iran (Persia)\u2014since the achaemenid empire. Technologies 10(4):94","journal-title":"Technologies"},{"issue":"3","key":"2048_CR61","doi-asserted-by":"publisher","first-page":"e8349","DOI":"10.1002\/cpe.8349","volume":"37","author":"A Heidari","year":"2025","unstructured":"Heidari A, Jamali MAJ, Navimipour NJ (2025) An innovative performance assessment method for increasing the efficiency of AODV routing protocol in VANETs through colored timed petri nets. Concurr Comput Pract Exp 37(3):e8349","journal-title":"Concurr Comput Pract Exp"},{"issue":"12","key":"2048_CR62","doi-asserted-by":"publisher","first-page":"6323","DOI":"10.1007\/s00371-022-02732-7","volume":"39","author":"M Nawaz","year":"2023","unstructured":"Nawaz M, Javed A, Irtaza A (2023) ResNet-swish-Dense54: a deep learning approach for deepfakes detection. Vis Comput 39(12):6323\u20136344. https:\/\/doi.org\/10.1007\/s00371-022-02732-7","journal-title":"Vis Comput"},{"issue":"5","key":"2048_CR63","doi-asserted-by":"publisher","first-page":"3095","DOI":"10.3390\/app13053095","volume":"13","author":"N Bansal","year":"2023","unstructured":"Bansal N, Aljrees T, Yadav DP, Singh KU, Kumar A, Verma GK, Singh T (2023) Real-time advanced computational intelligence for deep fake video detection. Appl Sci 13(5):3095. https:\/\/doi.org\/10.3390\/app13053095","journal-title":"Appl Sci"},{"issue":"16","key":"2048_CR64","doi-asserted-by":"publisher","first-page":"5413","DOI":"10.3390\/s21165413","volume":"21","author":"A Ismail","year":"2021","unstructured":"Ismail A, Elpeltagy M, Zaki MS, Eldahshan K (2021) A new deep learning-based methodology for video deepfake detection using XGBoost. Sensors 21(16):5413. https:\/\/doi.org\/10.3390\/s21165413","journal-title":"Sensors"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02048-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02048-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02048-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:22:40Z","timestamp":1758986560000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02048-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":64,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2048"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02048-y","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7]]},"assertion":[{"value":"19 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"244"}}