{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T17:33:33Z","timestamp":1778693613381,"version":"3.51.4"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T00:00:00Z","timestamp":1762819200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T00:00:00Z","timestamp":1762819200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1007\/s12083-025-02168-5","type":"journal-article","created":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T10:47:27Z","timestamp":1762858047000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A privacy-preserving and secure framework using blockchain-based quantum-inspired complex convolutional neural network for IoT-driven smart cities"],"prefix":"10.1007","volume":"19","author":[{"given":"Chandra Prakash","family":"Singh","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rohita","family":"Yamaganti","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lokendra Singh","family":"Umrao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,11,11]]},"reference":[{"key":"2168_CR1","unstructured":"Nations U (2018) World urbanization prospects: The 2018 revision, un department of economic and social affairs. Online. https:\/\/population.un.org\/wup\/"},{"key":"2168_CR2","doi-asserted-by":"publisher","first-page":"28361","DOI":"10.1109\/ACCESS.2021.3058244","volume":"9","author":"A Rahman","year":"2021","unstructured":"Rahman A, Islam MJ, Montieri A, Nasir MK, Reza MM, Band SS, Pescape A, Hasan M, Sookhak M, Mosavi A (2021) Smartblock-sdn: an optimized blockchain-sdn framework for resource management in iot. IEEE Access 9:28361\u201328376. https:\/\/doi.org\/10.1109\/ACCESS.2021.3058244","journal-title":"IEEE Access"},{"issue":"18","key":"2168_CR3","doi-asserted-by":"publisher","first-page":"17194","DOI":"10.1109\/JIOT.2022.3154632","volume":"9","author":"C Huang","year":"2022","unstructured":"Huang C, Xue L, Liu D, Shen X, Zhuang W, Sun R, Ying B (2022) Blockchain-assisted transparent cross-domain authorization and authentication for smart city. IEEE Internet Things J 9(18):17194\u201317209. https:\/\/doi.org\/10.1109\/JIOT.2022.3154632","journal-title":"IEEE Internet Things J"},{"key":"2168_CR4","doi-asserted-by":"publisher","first-page":"100860","DOI":"10.1016\/j.iot.2023.100860","volume":"23","author":"H Malik","year":"2023","unstructured":"Malik H, Anees T, Faheem M, Chaudhry MU, Ali A, Asghar MN (2023) Blockchain and internet of things in smart cities and drug supply management: open issues, opportunities, and future directions. Internet of Things 23:100860. https:\/\/doi.org\/10.1016\/j.iot.2023.100860","journal-title":"Internet of Things"},{"key":"2168_CR5","doi-asserted-by":"publisher","first-page":"100190","DOI":"10.1016\/j.jii.2020.100190","volume":"21","author":"S Latif","year":"2021","unstructured":"Latif S, Idrees Z, Ahmad J, Zheng L, Zou Z (2021) A blockchain-based architecture for secure and trustworthy operations in the industrial internet of things. J Ind Inf Integr 21:100190. https:\/\/doi.org\/10.1016\/j.jii.2020.100190","journal-title":"J Ind Inf Integr"},{"issue":"95","key":"2168_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10586-024-04835-3","volume":"28","author":"AM Tripathi","year":"2025","unstructured":"Tripathi AM, Umrao LS (2025) Integrated fuzzy decision tree based blockchain federated safety-as-a-service for iiot. Clust Comput 28(95):1\u201312. https:\/\/doi.org\/10.1007\/s10586-024-04835-3","journal-title":"Clust Comput"},{"issue":"5","key":"2168_CR7","doi-asserted-by":"publisher","first-page":"101532","DOI":"10.1016\/j.jksuci.2023.03.010","volume":"35","author":"Y Kayode Saheed","year":"2023","unstructured":"Kayode Saheed Y, Harazeem Abdulganiyu O, Ait Tchakoucht T (2023) A novel hybrid ensemble learning for anomaly detection in industrial sensor networks and scada systems for smart city infrastructures. J King Saud Univ Comput Inf Sci 35(5):101532. https:\/\/doi.org\/10.1016\/j.jksuci.2023.03.010","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"2168_CR8","doi-asserted-by":"publisher","first-page":"81118","DOI":"10.1109\/ACCESS.2025.3566980","volume":"13","author":"Y Kayode Saheed","year":"2025","unstructured":"Kayode Saheed Y, Ebere Chukwuere J (2025) Cps-iiot-p2attention: Explainable privacy-preserving with scaled dot-product attention in cyber-physical system-industrial iot network. IEEE Access 13:81118\u201381142. https:\/\/doi.org\/10.1109\/ACCESS.2025.3566980","journal-title":"IEEE Access"},{"issue":"14","key":"2168_CR9","doi-asserted-by":"publisher","first-page":"11717","DOI":"10.1109\/JIOT.2021.3058946","volume":"8","author":"BS Egala","year":"2021","unstructured":"Egala BS, Pradhan AK, Badarla V, Mohanty SP (2021) Fortified-chain: a blockchain-based framework for security and privacy-assured internet of medical things with effective access control. IEEE Internet Things J 8(14):11717\u201311731. https:\/\/doi.org\/10.1109\/JIOT.2021.3058946","journal-title":"IEEE Internet Things J"},{"key":"2168_CR10","doi-asserted-by":"publisher","first-page":"103851","DOI":"10.1016\/j.autcon.2021.103851","volume":"130","author":"X Tao","year":"2021","unstructured":"Tao X, Das M, Liu Y, Cheng JCP (2021) Distributed common data environment using blockchain and interplanetary file system for secure bim-based collaborative design. Autom Constr 130:103851. https:\/\/doi.org\/10.1016\/j.autcon.2021.103851","journal-title":"Autom Constr"},{"key":"2168_CR11","doi-asserted-by":"publisher","first-page":"103446","DOI":"10.1016\/j.jisa.2023.103446","volume":"74","author":"P Han","year":"2023","unstructured":"Han P, Zhang Z, Ji S, Wang X, Liu L, Ren Y (2023) Access control mechanism for the internet of things based on blockchain and inner product encryption. Journal of Information Security and Applications 74:103446. https:\/\/doi.org\/10.1016\/j.jisa.2023.103446","journal-title":"Journal of Information Security and Applications"},{"key":"2168_CR12","doi-asserted-by":"publisher","first-page":"200519","DOI":"10.1016\/j.iswa.2025.200519","volume":"26","author":"OH Abdulganiyu","year":"2025","unstructured":"Abdulganiyu OH, Ait Tchakoucht T, Alaoui AEH, Saheed YK (2025) Attention-driven multi-model architecture for unbalanced network traffic intrusion detection via extreme gradient boosting. Intell Syst Appl 26:200519. https:\/\/doi.org\/10.1016\/j.iswa.2025.200519","journal-title":"Intell Syst Appl"},{"key":"2168_CR13","doi-asserted-by":"publisher","unstructured":"Adeyiola AQ, Saheed YK, Misra S, Chockalingam S (2023) Metaheuristic firefly and c5.0 algorithms based intrusion detection for critical infrastructures. In: 2023 3rd International Conference on Applied Artificial Intelligence (ICAPAI), pp 1\u20137. https:\/\/doi.org\/10.1109\/ICAPAI58366.2023.10193917","DOI":"10.1109\/ICAPAI58366.2023.10193917"},{"issue":"9","key":"2168_CR14","doi-asserted-by":"publisher","first-page":"6415","DOI":"10.1109\/TII.2022.3143619","volume":"18","author":"S Qahtan","year":"2022","unstructured":"Qahtan S, Sharif KY, Zaidan AA, Alsattar HA, Albahri OS, Zaidan BB, Zulzalil H, Osman MH, Alamoodi AH, Mohammed RT (2022) Novel multi security and privacy benchmarking framework for blockchain-based iot healthcare industry 4.0 systems. IEEE Trans Ind Inform 18(9):6415\u20136423. https:\/\/doi.org\/10.1109\/TII.2022.3143619","journal-title":"IEEE Trans Ind Inform"},{"issue":"14","key":"2168_CR15","doi-asserted-by":"publisher","first-page":"15807","DOI":"10.1109\/JSEN.2021.3062219","volume":"21","author":"R Jabbar","year":"2021","unstructured":"Jabbar R, Fetais N, Kharbeche M, Krichen M, Barkaoui K, Shinoy M (2021) Blockchain for the internet of vehicles: How to use blockchain to secure vehicle-to-everything (v2x) communication and payment? IEEE Sens J 21(14):15807\u201315823. https:\/\/doi.org\/10.1109\/JSEN.2021.3062219","journal-title":"IEEE Sens J"},{"key":"2168_CR16","doi-asserted-by":"publisher","unstructured":"Josphine CV, Kingslin MT, Vincy RF, Mohana M, Babitha S (2024) Efficient quantum inspired blockchain-based cyber security framework in iot using deep learning and huristic algorithms. Intell Decis Technol 18(2):1203\u20131232. https:\/\/doi.org\/10.3233\/IDT-230579. https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/IDT-230579","DOI":"10.3233\/IDT-230579"},{"key":"2168_CR17","doi-asserted-by":"publisher","first-page":"115939","DOI":"10.1016\/j.chaos.2024.115939","volume":"191","author":"YK Saheed","year":"2025","unstructured":"Saheed YK, Misra S (2025) Cps-iot-ppdnn: A new explainable privacy preserving dnn for resilient anomaly detection in cyber-physical systems-enabled iot networks. Chaos, Solitons & Fractals 191:115939. https:\/\/doi.org\/10.1016\/j.chaos.2024.115939","journal-title":"Chaos, Solitons & Fractals"},{"key":"2168_CR18","doi-asserted-by":"publisher","unstructured":"Yaseen H, Hassan SI (2024) A systematic review on privacy preservation techniques for smart contracts in blockchain using machine learning. In: 2024 International Conference on Cognitive Robotics and Intelligent Systems (ICC - ROBINS), pp 822\u2013827. https:\/\/doi.org\/10.1109\/ICC-ROBINS60238.2024.10533967","DOI":"10.1109\/ICC-ROBINS60238.2024.10533967"},{"issue":"97","key":"2168_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-024-06626-4","volume":"81","author":"CP Singh","year":"2025","unstructured":"Singh CP, Yamaganti R, Umrao LS (2025) Variational onsager neural networks-based fair proof-of-reputation consensus for blockchain with transaction prioritisation for smart cities. J Supercomput 81(97):1\u201323. https:\/\/doi.org\/10.1007\/s11227-024-06626-4","journal-title":"J Supercomput"},{"key":"2168_CR20","doi-asserted-by":"publisher","first-page":"107209","DOI":"10.1016\/j.compeleceng.2021.107209","volume":"93","author":"P Singh","year":"2021","unstructured":"Singh P, Masud M, Hossain MS, Kaur A (2021) Blockchain and homomorphic encryption-based privacy-preserving data aggregation model in smart grid. Comput Electr Eng 93:107209. https:\/\/doi.org\/10.1016\/j.compeleceng.2021.107209","journal-title":"Comput Electr Eng"},{"issue":"1","key":"2168_CR21","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1109\/TCE.2023.3320157","volume":"70","author":"R Kumar","year":"2024","unstructured":"Kumar R, Javeed D, Aljuhani A, Jolfaei A, Kumar P, Islam AKMN (2024) Blockchain-based authentication and explainable ai for securing consumer iot applications. IEEE Trans Consum Electron 70(1):1145\u20131154. https:\/\/doi.org\/10.1109\/TCE.2023.3320157","journal-title":"IEEE Trans Consum Electron"},{"key":"2168_CR22","doi-asserted-by":"publisher","first-page":"121080","DOI":"10.1109\/ACCESS.2022.3214310","volume":"10","author":"C Sharma","year":"2022","unstructured":"Sharma C, Batra I, Sharma S, Malik A, Hosen ASMS, Ra I-H (2022) Predicting trends and research patterns of smart cities: a semi-automatic review using latent dirichlet allocation (lda). IEEE Access 10:121080\u2013121095. https:\/\/doi.org\/10.1109\/ACCESS.2022.3214310","journal-title":"IEEE Access"},{"key":"2168_CR23","doi-asserted-by":"publisher","first-page":"93032","DOI":"10.1109\/ACCESS.2023.3310264","volume":"11","author":"S Thapliyal","year":"2023","unstructured":"Thapliyal S, Wazid M, Singh DP, Das AK, Shetty S, Alqahtani A (2023) Design of robust blockchain-envisioned authenticated key management mechanism for smart healthcare applications. IEEE Access 11:93032\u201393047. https:\/\/doi.org\/10.1109\/ACCESS.2023.3310264","journal-title":"IEEE Access"},{"issue":"1","key":"2168_CR24","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1080\/16258312.2022.2101898","volume":"24","author":"A Aliahmadi","year":"2023","unstructured":"Aliahmadi A, Nozari H (2023) Evaluation of security metrics in aiot and blockchain-based supply chain by neutrosophic decision-making method. Supply Chain Forum An International Journal 24(1):31\u201342. https:\/\/doi.org\/10.1080\/16258312.2022.2101898","journal-title":"Supply Chain Forum An International Journal"},{"key":"2168_CR25","doi-asserted-by":"publisher","unstructured":"Challa R, Kothamasu KK (2024) A decentralized public-permissioned blockchain framework for enhanced security of health records in fog computing. Comput Methods Biomech Biomed Engin 27(13):1832\u20131844. https:\/\/doi.org\/10.1080\/10255842.2023.2262664. PMID: 37807911","DOI":"10.1080\/10255842.2023.2262664"},{"key":"2168_CR26","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.jpdc.2022.03.009","volume":"164","author":"J Jayabalan","year":"2022","unstructured":"Jayabalan J, Jeyanthi N (2022) Scalable blockchain model using off-chain ipfs storage for healthcare data security and privacy. J Parallel Distrib Comput 164:152\u2013167. https:\/\/doi.org\/10.1016\/j.jpdc.2022.03.009","journal-title":"J Parallel Distrib Comput"},{"issue":"3","key":"2168_CR27","doi-asserted-by":"publisher","first-page":"2326","DOI":"10.1109\/TNSE.2021.3089435","volume":"8","author":"P Kumar","year":"2021","unstructured":"Kumar P, Kumar R, Srivastava G, Gupta GP, Tripathi R, Gadekallu TR, Xiong NN (2021) Ppsf: A privacy-preserving and secure framework using blockchain-based machine-learning for iot-driven smart cities. IEEE Trans Netw Sci Eng 8(3):2326\u20132341. https:\/\/doi.org\/10.1109\/TNSE.2021.3089435","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"2168_CR28","doi-asserted-by":"publisher","first-page":"101954","DOI":"10.1016\/j.sysarc.2020.101954","volume":"115","author":"P Kumar","year":"2021","unstructured":"Kumar P, Gupta GP, Tripathi R (2021) Tp2sf: A trustworthy privacy-preserving secured framework for sustainable smart cities by leveraging blockchain and machine learning. J Syst Archit 115:101954. https:\/\/doi.org\/10.1016\/j.sysarc.2020.101954","journal-title":"J Syst Archit"},{"issue":"9","key":"2168_CR29","doi-asserted-by":"publisher","first-page":"16492","DOI":"10.1109\/TITS.2021.3098636","volume":"23","author":"R Kumar","year":"2022","unstructured":"Kumar R, Kumar P, Tripathi R, Gupta GP, Kumar N, Hassan MM (2022) A privacy-preserving-based secure framework using blockchain-enabled deep-learning in cooperative intelligent transport system. IEEE Trans Intell Transp Syst 23(9):16492\u201316503. https:\/\/doi.org\/10.1109\/TITS.2021.3098636","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"9","key":"2168_CR30","doi-asserted-by":"publisher","first-page":"6358","DOI":"10.1109\/TII.2022.3142030","volume":"18","author":"P Kumar","year":"2022","unstructured":"Kumar P, Kumar R, Gupta GP, Tripathi R, Srivastava G (2022) P2tif: A blockchain and deep learning framework for privacy-preserved threat intelligence in industrial iot. IEEE Trans Industr Inf 18(9):6358\u20136367. https:\/\/doi.org\/10.1109\/TII.2022.3142030","journal-title":"IEEE Trans Industr Inf"},{"key":"2168_CR31","doi-asserted-by":"publisher","first-page":"100917","DOI":"10.1016\/j.iot.2023.100917","volume":"24","author":"D Ahamad","year":"2023","unstructured":"Ahamad D, Hameed SA (2023) Two level blockchain-based privacy preservation framework in iot with heuristic fusion mechanism-aided deep learning architecture. Internet of Things 24:100917. https:\/\/doi.org\/10.1016\/j.iot.2023.100917","journal-title":"Internet of Things"},{"key":"2168_CR32","doi-asserted-by":"publisher","first-page":"101738","DOI":"10.1016\/j.pmcj.2022.101738","volume":"88","author":"D Hamouda","year":"2023","unstructured":"Hamouda D, Ferrag MA, Benhamida N, Seridi H (2023) Ppss: A privacy-preserving secure framework using blockchain-enabled federated deep learning for industrial iots. Pervasive Mob Comput 88:101738. https:\/\/doi.org\/10.1016\/j.pmcj.2022.101738","journal-title":"Pervasive Mob Comput"},{"issue":"8","key":"2168_CR33","doi-asserted-by":"publisher","first-page":"6661","DOI":"10.1109\/JIOT.2022.3175208","volume":"10","author":"SV Sanghami","year":"2023","unstructured":"Sanghami SV, Lee JJ, Hu Q (2023) Machine-learning-enhanced blockchain consensus with transaction prioritization for smart cities. IEEE Internet Things J 10(8):6661\u20136672. https:\/\/doi.org\/10.1109\/JIOT.2022.3175208","journal-title":"IEEE Internet Things J"},{"key":"2168_CR34","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.ceh.2025.04.002","volume":"8","author":"AA Ali","year":"2025","unstructured":"Ali AA, Gunavathie MA, Srinivasan V, Aruna M, Chennappan R, Matheena M (2025) Securing electronic health records using blockchain-enabled federated learning for iot-based smart healthcare. Clinical eHealth 8:125\u2013133. https:\/\/doi.org\/10.1016\/j.ceh.2025.04.002","journal-title":"Clinical eHealth"},{"key":"2168_CR35","doi-asserted-by":"publisher","unstructured":"Dorri A, Kanhere SS, Jurdak R, Gauravaram P (2017) Blockchain for iot security and privacy: The case study of a smart home. In: 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp 618\u2013623. https:\/\/doi.org\/10.1109\/PERCOMW.2017.7917634","DOI":"10.1109\/PERCOMW.2017.7917634"},{"issue":"95","key":"2168_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-024-01252-7","volume":"14","author":"F Mlika","year":"2024","unstructured":"Mlika F, Karoui W, Romdhane LB (2024) Trustworthy decentralization based on blockchain tools for social network architectures. Soc Netw Anal Min 14(95):1\u201328. https:\/\/doi.org\/10.1007\/s13278-024-01252-7","journal-title":"Soc Netw Anal Min"},{"key":"2168_CR37","doi-asserted-by":"publisher","first-page":"100585","DOI":"10.1016\/j.cosrev.2023.100585","volume":"50","author":"V Gugueoth","year":"2023","unstructured":"Gugueoth V, Safavat S, Shetty S, Rawat D (2023) A review of iot security and privacy using decentralized blockchain techniques. Comput Sci Rev 50:100585. https:\/\/doi.org\/10.1016\/j.cosrev.2023.100585","journal-title":"Comput Sci Rev"},{"key":"2168_CR38","doi-asserted-by":"publisher","unstructured":"Khrais LT (2020) Iot and blockchain in the development of smart cities. Int J Adv Comput Sci Appl 11(2). https:\/\/doi.org\/10.14569\/IJACSA.2020.0110220","DOI":"10.14569\/IJACSA.2020.0110220"},{"key":"2168_CR39","doi-asserted-by":"publisher","first-page":"102364","DOI":"10.1016\/j.scs.2020.102364","volume":"63","author":"S Singh","year":"2020","unstructured":"Singh S, Sharma PK, Yoon B, Shojafar M, Cho GH, Ra I-H (2020) Convergence of blockchain and artificial intelligence in iot network for the sustainable smart city. Sustain Cities Soc 63:102364. https:\/\/doi.org\/10.1016\/j.scs.2020.102364","journal-title":"Sustain Cities Soc"},{"key":"2168_CR40","doi-asserted-by":"publisher","unstructured":"Alkalbani M, Hamdaoui B, Zorba N, Rayes A (2019) A blockchain-based iot networks-on-demand protocol for responsive smart city applications. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp 1\u20136. https:\/\/doi.org\/10.1109\/GLOBECOM38437.2019.9013790","DOI":"10.1109\/GLOBECOM38437.2019.9013790"},{"key":"2168_CR41","doi-asserted-by":"publisher","first-page":"103316","DOI":"10.1016\/j.scs.2021.103316","volume":"75","author":"A Kolahan","year":"2021","unstructured":"Kolahan A, Maadi SR, Teymouri Z, Schenone C (2021) Blockchain-based solution for energy demand-side management of residential buildings. Sustain Cities Soc 75:103316. https:\/\/doi.org\/10.1016\/j.scs.2021.103316","journal-title":"Sustain Cities Soc"},{"key":"2168_CR42","doi-asserted-by":"publisher","first-page":"650","DOI":"10.1016\/j.future.2018.04.060","volume":"86","author":"PK Sharma","year":"2018","unstructured":"Sharma PK, Park JH (2018) Blockchain based hybrid network architecture for the smart city. Future Gener Comput Syst 86:650\u2013655. https:\/\/doi.org\/10.1016\/j.future.2018.04.060","journal-title":"Future Gener Comput Syst"},{"key":"2168_CR43","doi-asserted-by":"publisher","first-page":"209802","DOI":"10.1109\/ACCESS.2020.3036728","volume":"8","author":"N Koroniotis","year":"2020","unstructured":"Koroniotis N, Moustafa N, Schiliro F, Gauravaram P, Janicke H (2020) A holistic review of cybersecurity and reliability perspectives in smart airports. IEEE Access 8:209802\u2013209834. https:\/\/doi.org\/10.1109\/ACCESS.2020.3036728","journal-title":"IEEE Access"},{"key":"2168_CR44","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1016\/j.matcom.2021.09.014","volume":"192","author":"FK Onay","year":"2022","unstructured":"Onay FK, Salih BA (2022) Chaotic hunger games search optimization algorithm for global optimization and engineering problems. Math Comput Simul 192:514\u2013536. https:\/\/doi.org\/10.1016\/j.matcom.2021.09.014","journal-title":"Math Comput Simul"},{"issue":"15","key":"2168_CR45","doi-asserted-by":"publisher","first-page":"17912","DOI":"10.1007\/s10489-022-03525-0","volume":"52","author":"S Shi","year":"2022","unstructured":"Shi S, Wang Z, Cui G, Wang S, Shang R, Li W, Wei Z, Gu Y (2022) Quantum-inspired complex convolutional neural networks. Appl Intell 52(15):17912\u20131792. https:\/\/doi.org\/10.1007\/s10489-022-03525-0","journal-title":"Appl Intell"},{"key":"2168_CR46","doi-asserted-by":"publisher","first-page":"115408","DOI":"10.1016\/j.eswa.2021.115408","volume":"183","author":"MM Noel","year":"2021","unstructured":"Noel MM, Muthiah-Nakarajan V, Amali GB, Trivedi AS (2021) A new biologically inspired global optimization algorithm based on firebug reproductive swarming behaviour. Expert Syst Appl 183:115408. https:\/\/doi.org\/10.1016\/j.eswa.2021.115408","journal-title":"Expert Syst Appl"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02168-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02168-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02168-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T12:19:11Z","timestamp":1773145151000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02168-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,11]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["2168"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02168-5","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-6332750\/v1","asserted-by":"object"}]},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,11]]},"assertion":[{"value":"29 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have declared that they have no conflict of interest in this work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The work submitted is original, and the manuscript has not been submitted to another journal for simultaneous consideration.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare that they consent to publish the article.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"3"}}