{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T21:16:58Z","timestamp":1777497418856,"version":"3.51.4"},"reference-count":63,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Future Generation Computer Systems"],"published-print":{"date-parts":[[2026,9]]},"DOI":"10.1016\/j.future.2026.108489","type":"journal-article","created":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T00:11:49Z","timestamp":1774051909000},"page":"108489","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":3,"special_numbering":"C","title":["A trust-aware and cost-optimized blockchain oracle selection model with deep reinforcement learning"],"prefix":"10.1016","volume":"182","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-2209-6820","authenticated-orcid":false,"given":"Hengyang","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9887-785X","authenticated-orcid":false,"given":"Shike","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5861-7662","authenticated-orcid":false,"given":"Hang","family":"Bao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8428-9977","authenticated-orcid":false,"given":"Yaping","family":"Cao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5442-1423","authenticated-orcid":false,"given":"Jianbin","family":"Li","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"13","key":"10.1016\/j.future.2026.108489_bib0001","doi-asserted-by":"crossref","first-page":"10452","DOI":"10.1109\/JIOT.2021.3060508","article-title":"Embedding blockchain technology into IoT for security: a survey","volume":"8","author":"Xu","year":"2021","journal-title":"IEEE Internet Things J."},{"issue":"16","key":"10.1016\/j.future.2026.108489_bib0002","doi-asserted-by":"crossref","first-page":"14723","DOI":"10.1109\/JIOT.2021.3054866","article-title":"Blockchain-inspired secure computation offloading in a vehicular cloud network","volume":"9","author":"Xu","year":"2022","journal-title":"IEEE Internet Things J."},{"issue":"7","key":"10.1016\/j.future.2026.108489_bib0003","doi-asserted-by":"crossref","first-page":"6010","DOI":"10.1109\/JIOT.2019.2951593","article-title":"Trusted cloud-edge network resource management: DRL-driven service function chain orchestration for IoT","volume":"7","author":"Guo","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.future.2026.108489_bib0004","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2021.116030","article-title":"A blockchain-based approach to smart Cargo transportation using UHF RFID","volume":"188","author":"Baygin","year":"2022","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.future.2026.108489_bib0005","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2021.115101","article-title":"A blockchain-based system to enhance aircraft parts traceability and trackability for inventory management","volume":"179","author":"Ho","year":"2021","journal-title":"Expert Syst. Appl."},{"issue":"8","key":"10.1016\/j.future.2026.108489_bib0006","first-page":"3690","article-title":"Consortium blockchain for secure energy trading in industrial internet of things","volume":"14","author":"Li","year":"2018","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.future.2026.108489_bib0007","series-title":"Blockchain Across Oracle: Understand the Details and Implications of the Blockchain for Oracle developers and customers","author":"Van M\u00f6lken","year":"2018"},{"key":"10.1016\/j.future.2026.108489_bib0008","series-title":"2019 IEEE International Conference on Industrial Internet (ICII)","first-page":"248","article-title":"Decentralized access control for IoT data using blockchain and trusted oracles","author":"Al Breiki","year":"2019"},{"key":"10.1016\/j.future.2026.108489_bib0009","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2023.103672","article-title":"From trust to truth: advancements in mitigating the blockchain oracle problem","volume":"217","author":"Hassan","year":"2023","journal-title":"J. Netw. Comput. Appl."},{"issue":"8","key":"10.1016\/j.future.2026.108489_bib0010","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/MCOM.007.2200906","article-title":"A decentralized oracle architecture for a blockchain-based IoT global market","volume":"61","author":"Gigli","year":"2023","journal-title":"IEEE Commun. Mag."},{"issue":"11","key":"10.1016\/j.future.2026.108489_bib0011","doi-asserted-by":"crossref","first-page":"509","DOI":"10.3390\/info11110509","article-title":"Understanding the blockchain oracle problem: a call for action","volume":"11","author":"Caldarelli","year":"2020","journal-title":"Information"},{"issue":"6","key":"10.1016\/j.future.2026.108489_bib0012","doi-asserted-by":"crossref","first-page":"2391","DOI":"10.3390\/su12062391","article-title":"Overcoming the blockchain oracle problem in the traceability of non-fungible products","volume":"12","author":"Caldarelli","year":"2020","journal-title":"Sustainability"},{"key":"10.1016\/j.future.2026.108489_bib0013","unstructured":"V. Costan, S. Devadas, Intel SGX explained, Cryptology ePrint Archive, Paper 2016\/086, (2016), https:\/\/eprint.iacr.org\/2016\/086."},{"key":"10.1016\/j.future.2026.108489_bib0014","series-title":"Proceedings of the 2016 aCM sIGSAC Conference on Computer and Communications Security","first-page":"270","article-title":"Town crier: an authenticated data feed for smart contracts","author":"Zhang","year":"2016"},{"key":"10.1016\/j.future.2026.108489_bib0015","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.119160","article-title":"A reinforcement learning model for the reliability of blockchain oracles","volume":"214","author":"Taghavi","year":"2023","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.future.2026.108489_bib0016","doi-asserted-by":"crossref","first-page":"85675","DOI":"10.1109\/ACCESS.2020.2992698","article-title":"Trustworthy blockchain oracles: review, comparison, and open research challenges","volume":"8","author":"Al-Breiki","year":"2020","journal-title":"IEEE Access"},{"issue":"12","key":"10.1016\/j.future.2026.108489_bib0017","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1145\/355112.355122","article-title":"Reputation systems","volume":"43","author":"Resnick","year":"2000","journal-title":"Commun. ACM"},{"key":"10.1016\/j.future.2026.108489_bib0018","unstructured":"Blog Chainlink, Chainlink Product Update: Q1 2024, 2024, https:\/\/blog.chain.link\/product-update-q1-2024."},{"issue":"8","key":"10.1016\/j.future.2026.108489_bib0019","doi-asserted-by":"crossref","first-page":"8092","DOI":"10.1109\/TMC.2023.3342817","article-title":"Blockchain-secured task offloading and resource allocation for cloud-edge-end cooperative networks","volume":"23","author":"Fan","year":"2024","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"10","key":"10.1016\/j.future.2026.108489_bib0020","doi-asserted-by":"crossref","first-page":"15894","DOI":"10.1109\/TVT.2025.3568714","article-title":"Blockchain-based distributed resource management for delay minimization in UAV-assisted vehicular networks","volume":"74","author":"Zhang","year":"2025","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.future.2026.108489_bib0021","first-page":"1","article-title":"VETchain: a scalable vehicular energy trading blockchain with optimized trade matching","author":"Sun","year":"2025","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"2","key":"10.1016\/j.future.2026.108489_bib0022","first-page":"423","article-title":"Reinforcement learning: an introduction. by richard\u2019s sutton","volume":"6","author":"Barto","year":"2021","journal-title":"SIAM Rev."},{"issue":"3","key":"10.1016\/j.future.2026.108489_bib0023","doi-asserted-by":"crossref","first-page":"1659","DOI":"10.1109\/COMST.2021.3073036","article-title":"Deep reinforcement learning for internet of things: a comprehensive survey","volume":"23","author":"Chen","year":"2021","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"10.1016\/j.future.2026.108489_bib0024","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.120972","article-title":"Cost-aware scheduling systems for real-time workflows in cloud: an approach based on genetic algorithm and deep reinforcement learning","volume":"234","author":"Zhang","year":"2023","journal-title":"Expert Syst. Appl."},{"issue":"5","key":"10.1016\/j.future.2026.108489_bib0025","doi-asserted-by":"crossref","first-page":"5135","DOI":"10.1109\/TNSM.2024.3399837","article-title":"A trustworthy and consistent blockchain oracle scheme for industrial internet of things","volume":"21","author":"Liu","year":"2024","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"10.1016\/j.future.2026.108489_bib0026","first-page":"1","article-title":"Chainlink 2.0: next steps in the evolution of decentralized oracle networks","volume":"1","author":"Breidenbach","year":"2021","journal-title":"Chainlink Labs"},{"key":"10.1016\/j.future.2026.108489_bib0027","unstructured":"B. Benligiray, S. Milic, H. V\u00e4nttinen, Decentralized apis for web 3.0, API3 Foundation Whitepaper, (2020), https:\/\/old-docs.api3.org\/api3-whitepaper-v1.0.3.pdf."},{"key":"10.1016\/j.future.2026.108489_bib0028","unstructured":"Band Protocol, Band protocol, (2026). https:\/\/www.bandprotocol.com\/."},{"issue":"3","key":"10.1016\/j.future.2026.108489_bib0029","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/j.jksuci.2016.10.003","article-title":"A survey on internet of things architectures","volume":"30","author":"Ray","year":"2018","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"issue":"9","key":"10.1016\/j.future.2026.108489_bib0030","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/MC.2011.291","article-title":"Securing the internet of things","volume":"44","author":"Roman","year":"2011","journal-title":"Computer"},{"issue":"1","key":"10.1016\/j.future.2026.108489_bib0031","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1186\/s13677-023-00416-8","article-title":"IoT trust and reputation: a survey and taxonomy","volume":"12","author":"Aaqib","year":"2023","journal-title":"J. Cloud Comput."},{"issue":"6","key":"10.1016\/j.future.2026.108489_bib0032","doi-asserted-by":"crossref","first-page":"9326","DOI":"10.1109\/JIOT.2019.2933518","article-title":"A comprehensive study on the trust management techniques in the internet of things","volume":"6","author":"Pourghebleh","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.future.2026.108489_bib0033","series-title":"Trust Management VII: 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3\u20137, 2013. Proceedings 7","first-page":"66","article-title":"Reputation-based trust systems for wireless sensor networks: a comprehensive review","author":"Alzaid","year":"2013"},{"issue":"7","key":"10.1016\/j.future.2026.108489_bib0034","doi-asserted-by":"crossref","first-page":"5898","DOI":"10.1109\/JIOT.2023.3237893","article-title":"A survey on blockchain-based trust management for internet of things","volume":"10","author":"Liu","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.future.2026.108489_bib0035","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2024.3400672","article-title":"A blockchain oracle interoperability technique for permissioned blockchain","author":"Alhussayen","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.future.2026.108489_bib0036","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1016\/j.future.2019.07.030","article-title":"Trust management in a blockchain based fog computing platform with trustless smart oracles","volume":"101","author":"Kochovski","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"issue":"9","key":"10.1016\/j.future.2026.108489_bib0037","doi-asserted-by":"crossref","first-page":"2725","DOI":"10.3390\/s20092725","article-title":"A distributed oracle using intel sgx for blockchain-based iot applications","volume":"20","author":"Woo","year":"2020","journal-title":"Sensors"},{"issue":"9","key":"10.1016\/j.future.2026.108489_bib0038","doi-asserted-by":"crossref","first-page":"573","DOI":"10.23919\/transcom.2023EBP3156","article-title":"A distributed efficient blockchain oracle scheme for internet of things","volume":"E107-B","author":"Xian","year":"2024","journal-title":"IEICE Trans. Commun."},{"issue":"3","key":"10.1016\/j.future.2026.108489_bib0039","doi-asserted-by":"crossref","first-page":"95","DOI":"10.4236\/jcc.2021.93007","article-title":"Trusted blockchain oracle scheme based on aggregate signature","volume":"9","author":"Liu","year":"2021","journal-title":"J. Comput. Commun."},{"key":"10.1016\/j.future.2026.108489_bib0040","doi-asserted-by":"crossref","DOI":"10.1016\/j.csi.2024.103892","article-title":"PSCBO: a provably secure consensus-based blockchain oracle","volume":"91","author":"Yao","year":"2025","journal-title":"Comput. Stand. Interfaces"},{"key":"10.1016\/j.future.2026.108489_bib0041","doi-asserted-by":"crossref","DOI":"10.1016\/j.autcon.2021.103816","article-title":"Exploring smart construction objects as blockchain oracles in construction supply chain management","volume":"129","author":"Lu","year":"2021","journal-title":"Autom. Constr."},{"key":"10.1016\/j.future.2026.108489_bib0042","unstructured":"A. Pupyshev, D. Gubanov, E. Dzhafarov, I. Sapranidi, I. Kardanov, V. Zhuravlev, S. Khalilov, M. Jansen, S. Laureyssens, I. Pavlov, et al., Gravity: a blockchain-agnostic cross-chain communication and data oracles protocol, (2020). arXiv: 2007.00966."},{"key":"10.1016\/j.future.2026.108489_bib0043","unstructured":"A.S. De Pedro, D. Levi, C.L. Iv\u00e1n, WitNet: a decentralized oracle network protocol,(2017). arXiv: 1711.09756."},{"issue":"20","key":"10.1016\/j.future.2026.108489_bib0044","doi-asserted-by":"crossref","first-page":"42021","DOI":"10.1109\/JIOT.2025.3591301","article-title":"ZONIA: a zero-trust oracle system for blockchain IoT applications","volume":"12","author":"Gigli","year":"2025","journal-title":"IEEE Internet Things J."},{"issue":"5","key":"10.1016\/j.future.2026.108489_bib0045","doi-asserted-by":"crossref","first-page":"5006","DOI":"10.1109\/TWC.2023.3323974","article-title":"Trusted mobile edge computing: DAG blockchain-aided trust management and resource allocation","volume":"23","author":"Yang","year":"2023","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"2","key":"10.1016\/j.future.2026.108489_bib0046","first-page":"1292","article-title":"Decentralized blockchain-based trust management protocol for the internet of things","volume":"19","author":"Kouicem","year":"2020","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.future.2026.108489_bib0047","series-title":"2019 IEEE International Conference on Blockchain (Blockchain)","first-page":"184","article-title":"TrustChain: trust management in blockchain and iot supported supply chains","author":"Malik","year":"2019"},{"key":"10.1016\/j.future.2026.108489_bib0048","doi-asserted-by":"crossref","DOI":"10.1016\/j.aei.2021.101522","article-title":"An integrated framework for blockchain-enabled supply chain trust management towards smart manufacturing","volume":"51","author":"Wu","year":"2022","journal-title":"Adv. Eng. Inf."},{"issue":"1","key":"10.1016\/j.future.2026.108489_bib0049","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1109\/JIOT.2023.3277691","article-title":"A blockchain-based trust-value management approach for secure information sharing in internet of vehicles","volume":"11","author":"Du","year":"2023","journal-title":"IEEE Internet Things J."},{"issue":"11","key":"10.1016\/j.future.2026.108489_bib0050","doi-asserted-by":"crossref","first-page":"8693","DOI":"10.1109\/JIOT.2020.3040957","article-title":"Reinforcement learning for iot security: a comprehensive survey","volume":"8","author":"Uprety","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"11","key":"10.1016\/j.future.2026.108489_bib0051","doi-asserted-by":"crossref","first-page":"2581","DOI":"10.1109\/TMC.2019.2928811","article-title":"Deep reinforcement learning for online computation offloading in wireless powered mobile-edge computing networks","volume":"19","author":"Huang","year":"2019","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"4","key":"10.1016\/j.future.2026.108489_bib0052","doi-asserted-by":"crossref","first-page":"5681","DOI":"10.1109\/JIOT.2023.3311414","article-title":"An overlapping self-organizing sharding scheme based on DRL for large-scale IIot blockchain","volume":"11","author":"Yang","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.future.2026.108489_bib0053","first-page":"1","article-title":"Efficiency optimization for blockchain-enabled V2V energy trading with dynamic clustering based on deep reinforcement learning","author":"Wu","year":"2025","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"10.1016\/j.future.2026.108489_bib0054","doi-asserted-by":"crossref","first-page":"1629","DOI":"10.1109\/TNSM.2024.3499746","article-title":"RLChain: a DRL approach for blockchain performance optimization toward IIot","volume":"22","author":"An","year":"2025","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"8","key":"10.1016\/j.future.2026.108489_bib0055","doi-asserted-by":"crossref","first-page":"11356","DOI":"10.1109\/TITS.2025.3559672","article-title":"Trust model-based consensus optimization for vehicle platooning networks: a novel deep reinforcement learning approach with GenAI","volume":"26","author":"Chen","year":"2025","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"1","key":"10.1016\/j.future.2026.108489_bib0056","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3697011","article-title":"Decision support model for selecting the optimal blockchain oracle platform: an evaluation of key factors","volume":"34","author":"Ahmadjee","year":"2025","journal-title":"ACM Trans. Software Eng. Method."},{"issue":"3","key":"10.1016\/j.future.2026.108489_bib0057","doi-asserted-by":"crossref","first-page":"213","DOI":"10.24843\/JIM.2021.v09.i03.p03","article-title":"Information Security Risk Strategy at PT. X Using NIST SP 800-30","volume":"9","author":"Eryawan","year":"2021","journal-title":"Jurnal Ilmiah Merpati (Menara Penelitian Akademika Teknologi Informasi)"},{"issue":"9","key":"10.1016\/j.future.2026.108489_bib0058","doi-asserted-by":"crossref","first-page":"5554","DOI":"10.1109\/TIV.2023.3347870","article-title":"TD-SAS: a trust-aware and decentralized speed advisory system for energy-efficient autonomous vehicle platoons","volume":"9","author":"Li","year":"2023","journal-title":"IEEE Trans. Intell. Veh."},{"key":"10.1016\/j.future.2026.108489_bib0059","first-page":"279","article-title":"Q-learning","volume":"8","author":"Watkins","year":"1992","journal-title":"Mach. Learn."},{"issue":"7540","key":"10.1016\/j.future.2026.108489_bib0060","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1038\/nature14236","article-title":"Human-level control through deep reinforcement learning","volume":"518","author":"Mnih","year":"2015","journal-title":"Nature"},{"issue":"3","key":"10.1016\/j.future.2026.108489_bib0061","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1016\/j.ejor.2007.05.046","article-title":"Round robin scheduling\u2013a survey","volume":"188","author":"Rasmussen","year":"2008","journal-title":"Eur. J. Oper. Res."},{"key":"10.1016\/j.future.2026.108489_bib0062","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2022.103333","article-title":"Deadline-aware and energy-efficient IoT task scheduling in fog computing systems: a semi-greedy approach","volume":"201","author":"Azizi","year":"2022","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"10.1016\/j.future.2026.108489_bib0063","doi-asserted-by":"crossref","first-page":"3297","DOI":"10.1109\/TNSM.2020.3046906","article-title":"Trust-related attacks and their detection: a trust management model for the social IoT","volume":"18","author":"Marche","year":"2020","journal-title":"IEEE Trans. Netw. Serv. Manage."}],"container-title":["Future Generation Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X26001238?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X26001238?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,19]],"date-time":"2026-04-19T08:14:49Z","timestamp":1776586489000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X26001238"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,9]]},"references-count":63,"alternative-id":["S0167739X26001238"],"URL":"https:\/\/doi.org\/10.1016\/j.future.2026.108489","relation":{},"ISSN":["0167-739X"],"issn-type":[{"value":"0167-739X","type":"print"}],"subject":[],"published":{"date-parts":[[2026,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A trust-aware and cost-optimized blockchain oracle selection model with deep reinforcement learning","name":"articletitle","label":"Article Title"},{"value":"Future Generation Computer Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.future.2026.108489","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"108489"}}