{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T09:47:57Z","timestamp":1771926477610,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T00:00:00Z","timestamp":1643068800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T00:00:00Z","timestamp":1643068800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s12652-021-03663-2","type":"journal-article","created":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T00:02:51Z","timestamp":1643068971000},"page":"9959-9972","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":37,"title":["Deep reinforcement learning approach for computation offloading in blockchain-enabled communications systems"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2731-4627","authenticated-orcid":false,"given":"Tanweer","family":"Alam","sequence":"first","affiliation":[]},{"given":"Arif","family":"Ullah","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Benaida","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,25]]},"reference":[{"key":"3663_CR1","doi-asserted-by":"crossref","unstructured":"Aftab A, Ashraf N, Qureshi HK, Hassan SA, Jangsher S (2020) BLOCK-ML: blockchain and machine learning for UAV-BSs deployment. In: IEEE 92nd vehicular technology conference","DOI":"10.1109\/VTC2020-Fall49728.2020.9348719"},{"key":"3663_CR4","doi-asserted-by":"crossref","unstructured":"Alam T (2019) IoT-Fog: A communication framework using Blockchain in the internet of things. In: Int J Recent Technol Eng (IJRTE) 7(6)","DOI":"10.2139\/ssrn.3638991"},{"issue":"1","key":"3663_CR2","doi-asserted-by":"publisher","first-page":"28","DOI":"10.30630\/joiv.4.1.334","volume":"4","author":"T Alam","year":"2020","unstructured":"Alam T (2020) Design a blockchain-based middleware layer in the Internet of Things Architecture. JOIV: Int J Inf vis 4(1):28\u201331","journal-title":"JOIV: Int J Inf vis"},{"issue":"6","key":"3663_CR3","doi-asserted-by":"publisher","first-page":"74","DOI":"10.3991\/ijim.v12i6.6776","volume":"12","author":"T Alam","year":"2018","unstructured":"Alam T, Benaida M (2018) CICS: cloud\u2013internet communication security framework for the internet of smart devices. Int J Interact Mobile Technol (iJIM) 12(6):74","journal-title":"Int J Interact Mobile Technol (iJIM)"},{"issue":"12","key":"3663_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4005","volume":"32","author":"J Bhatia","year":"2019","unstructured":"Bhatia J, Modi Y, Tanwar S, Bhavsar M (2019) Software defined vehicular networks: a comprehensive review. Int J Commun Syst 32(12):e4005","journal-title":"Int J Commun Syst"},{"issue":"3","key":"3663_CR6","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MNET.2019.1800376","volume":"33","author":"Y Dai","year":"2019","unstructured":"Dai Y, Xu D, Maharjan S, Chen Z, He Q, Zhang Y (2019) Blockchain and deep reinforcement learning empowered intelligent 5G beyond. IEEE Network 33(3):10\u201317","journal-title":"IEEE Network"},{"issue":"4","key":"3663_CR7","doi-asserted-by":"publisher","first-page":"4312","DOI":"10.1109\/TVT.2020.2973705","volume":"69","author":"Y Dai","year":"2020","unstructured":"Dai Y, Xu D, Zhang K, Maharjan S, Zhang Y (2020) Deep reinforcement learning and permissioned Blockchain for content caching in vehicular edge computing and networks. IEEE Trans Veh Technol 69(4):4312\u20134324","journal-title":"IEEE Trans Veh Technol"},{"key":"3663_CR8","doi-asserted-by":"crossref","unstructured":"Fran\u00e7ois-Lavet V, Henderson P, Islam R, Bellemare MG, Pineau J (2018) An introduction to deep reinforcement learning. arXiv preprint http:\/\/arxiv.org\/abs\/1811.12560","DOI":"10.1561\/9781680835397"},{"key":"3663_CR9","doi-asserted-by":"crossref","unstructured":"Gao Y, Wu W, Nan H, Sun Y, Si P (2020) Deep reinforcement learning based task scheduling in mobile blockchain for IoT applications. In: ICC 2020\u20132020 IEEE international conference on communications (ICC). IEEE, pp 1\u20137","DOI":"10.1109\/ICC40277.2020.9148888"},{"key":"3663_CR10","doi-asserted-by":"crossref","unstructured":"Gong Y, Sun S, Wei Y, Song M (2021) Deep reinforcement learning for edge computing resource allocation in blockchain network slicing broker framework. In: 2021 IEEE 93rd vehicular technology conference (VTC2021-Spring). IEEE, pp 1\u20136","DOI":"10.1109\/VTC2021-Spring51267.2021.9449081"},{"issue":"12","key":"3663_CR11","doi-asserted-by":"publisher","first-page":"5161","DOI":"10.3390\/su12125161","volume":"12","author":"F Jameel","year":"2020","unstructured":"Jameel F, Javaid U, Khan WU, Aman MN, Pervaiz H, J\u00e4ntti R (2020) Reinforcement learning in blockchain-enabled IIoT networks: a survey of recent advances and open challenges. Sustainability 12(12):5161","journal-title":"Sustainability"},{"key":"3663_CR12","doi-asserted-by":"crossref","unstructured":"Lan D, Taherkordi A, Eliassen F, Liu L (2020) Deep reinforcement learning for computation offloading and caching in fog-based vehicular networks. In: 2020 IEEE 17th international conference on mobile ad hoc and sensor systems (MASS), IEEE, pp 622\u2013630","DOI":"10.1109\/MASS50613.2020.00081"},{"issue":"7","key":"3663_CR13","doi-asserted-by":"publisher","first-page":"6392","DOI":"10.1109\/JIOT.2020.2974281","volume":"7","author":"W Liang","year":"2020","unstructured":"Liang W, Huang W, Long J, Zhang K, Li KC, Zhang D (2020) Deep reinforcement learning for resource protection and real-time detection in IoT environment. IEEE Internet Things J 7(7):6392\u20136401","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"3663_CR14","doi-asserted-by":"publisher","first-page":"3516","DOI":"10.1109\/TII.2018.2890203","volume":"15","author":"CH Liu","year":"2018","unstructured":"Liu CH, Lin Q, Wen S (2018) Blockchain-enabled data collection and sharing for industrial IoT with deep reinforcement learning. IEEE Trans Industr Inf 15(6):3516\u20133526","journal-title":"IEEE Trans Industr Inf"},{"key":"3663_CR16","doi-asserted-by":"crossref","unstructured":"Liu M, Teng Y, Yu FR, Leung VC, Song M (2019a) Deep reinforcement learning based performance optimization in blockchain-enabled Internet of vehicle. In: ICC 2019\u20132019 IEEE International Conference on Communications (ICC). IEEE, pp 1\u20136.","DOI":"10.1109\/ICC.2019.8761206"},{"issue":"6","key":"3663_CR15","doi-asserted-by":"publisher","first-page":"3559","DOI":"10.1109\/TII.2019.2897805","volume":"15","author":"M Liu","year":"2019","unstructured":"Liu M, Yu FR, Teng Y, Leung VC, Song M (2019b) Performance optimization for blockchain-enabled industrial Internet of Things (IIoT) systems: a deep reinforcement learning approach. IEEE Trans Industr Inf 15(6):3559\u20133570","journal-title":"IEEE Trans Industr Inf"},{"key":"3663_CR17","unstructured":"Nguyen DC, Pathirana PN, Ding M, Seneviratne A (2019) Blockchain as a Service for Multi-Access Edge Computing: A Deep Reinforcement Learning Approach. arXiv preprint http:\/\/arxiv.org\/abs\/2001.08165"},{"key":"3663_CR18","unstructured":"Nguyen D, Pathirana P, Ding M, Seneviratne A (2021) Secure computation offloading in Blockchain based IoT networks with deep reinforcement learning. In: IEEE Transactions on Network Science and Engineering"},{"key":"3663_CR19","doi-asserted-by":"crossref","unstructured":"Otto F (2021) Model-free deep reinforcement learning\u2014algorithms and applications. In: Reinforcement learning algorithms: analysis and applications. Springer, Cham, pp 109\u2013121","DOI":"10.1007\/978-3-030-41188-6_10"},{"issue":"8","key":"3663_CR20","doi-asserted-by":"publisher","first-page":"8050","DOI":"10.1109\/TVT.2019.2924015","volume":"68","author":"X Qiu","year":"2019","unstructured":"Qiu X, Liu L, Chen W, Hong Z, Zheng Z (2019) Online deep reinforcement learning for computation offloading in blockchain-empowered mobile edge computing. IEEE Trans Veh Technol 68(8):8050\u20138062","journal-title":"IEEE Trans Veh Technol"},{"key":"3663_CR21","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/OJCS.2020.3010987","volume":"2","author":"C Qiu","year":"2020","unstructured":"Qiu C, Ren X, Cao Y, Mai T (2020) Deep reinforcement learning empowered adaptivity for future blockchain networks. IEEE Open J Comput Soc 2:99\u2013105","journal-title":"IEEE Open J Comput Soc"},{"key":"3663_CR22","doi-asserted-by":"publisher","first-page":"90075","DOI":"10.1109\/ACCESS.2021.3077069","volume":"9","author":"S Rathore","year":"2021","unstructured":"Rathore S, Park JH, Chang H (2021) Deep learning and blockchain-empowered security framework for intelligent 5G-enabled IoT. IEEE Access 9:90075\u201390083","journal-title":"IEEE Access"},{"key":"3663_CR23","doi-asserted-by":"crossref","unstructured":"Tsai CW (2021) Toward blockchain for intelligent systems. IEEE Consumer Electronics Magazine","DOI":"10.1109\/MCE.2021.3076611"},{"issue":"5","key":"3663_CR24","doi-asserted-by":"publisher","first-page":"2183","DOI":"10.1002\/int.22375","volume":"36","author":"T Wang","year":"2021","unstructured":"Wang T, Liew SC, Zhang S (2021) When Blockchain meets AI: optimal mining strategy achieved by machine learning. Int J Intell Syst 36(5):2183\u20132207","journal-title":"Int J Intell Syst"},{"key":"3663_CR25","doi-asserted-by":"crossref","unstructured":"Weng J, Weng J, Zhang J, Li M, Zhang Y, Luo W (2019) Deepchain: auditable and privacy-preserving deep learning with blockchain-based incentive. IEEE Transactions on Dependable and Secure Computing","DOI":"10.1109\/TDSC.2019.2952332"},{"key":"3663_CR26","doi-asserted-by":"publisher","first-page":"108004","DOI":"10.1016\/j.comnet.2021.108004","volume":"191","author":"Y Wu","year":"2021","unstructured":"Wu Y, Wang Z, Ma Y, Leung VC (2021) Deep reinforcement learning for Blockchain in industrial IoT: a survey. Comput Networks 191:108004","journal-title":"Comput Networks"},{"key":"3663_CR27","doi-asserted-by":"crossref","unstructured":"Yue Y, Li S, Legg P, Li F (2021) Deep learning-based security behaviour analysis in IoT environments: a survey. Security and Communication Networks","DOI":"10.1155\/2021\/8873195"},{"issue":"10","key":"3663_CR28","doi-asserted-by":"publisher","first-page":"6469","DOI":"10.1109\/TWC.2020.3003454","volume":"19","author":"R Zhang","year":"2020","unstructured":"Zhang R, Yu FR, Liu J, Huang T, Liu Y (2020) Deep reinforcement learning (DRL)-based device-to-device (D2D) caching with Blockchain and mobile edge computing. IEEE Trans Wireless Commun 19(10):6469\u20136485","journal-title":"IEEE Trans Wireless Commun"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-03663-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-021-03663-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-03663-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,21]],"date-time":"2023-06-21T14:56:33Z","timestamp":1687359393000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-021-03663-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,25]]},"references-count":28,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["3663"],"URL":"https:\/\/doi.org\/10.1007\/s12652-021-03663-2","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,25]]},"assertion":[{"value":"31 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declares no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}