{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T15:18:47Z","timestamp":1773415127627,"version":"3.50.1"},"reference-count":55,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T00:00:00Z","timestamp":1741305600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004147","name":"Tsinghua University","doi-asserted-by":"publisher","award":["LZZLX24F007"],"award-info":[{"award-number":["LZZLX24F007"]}],"id":[{"id":"10.13039\/501100004147","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272043"],"award-info":[{"award-number":["62272043"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["High-Confidence Computing"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1016\/j.hcc.2025.100316","type":"journal-article","created":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T04:19:17Z","timestamp":1742185157000},"page":"100316","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":4,"title":["LSTM stock prediction model based on blockchain"],"prefix":"10.1016","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-9921-5668","authenticated-orcid":false,"given":"Yongdan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Haibin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Baohan","family":"Huang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9077-344X","authenticated-orcid":false,"given":"Zhijun","family":"Lin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1804-7638","authenticated-orcid":false,"given":"Chuan","family":"Pang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.hcc.2025.100316_b1","series-title":"Stocks for the Long Run: The Definitive Guide to Financial Market Returns & Long-Term Investment Strategies","author":"Siegel","year":"2021"},{"issue":"3","key":"10.1016\/j.hcc.2025.100316_b2","first-page":"49","article-title":"An analysis on stock market prediction using data mining techniques","volume":"4","author":"Prasanna","year":"2013","journal-title":"Int. J. Comput. Sci. Eng. Technol. (IJCSET)"},{"key":"10.1016\/j.hcc.2025.100316_b3","doi-asserted-by":"crossref","DOI":"10.1016\/j.cosrev.2019.08.001","article-title":"Systematic analysis and review of stock market prediction techniques","volume":"34","author":"Gandhmal","year":"2019","journal-title":"Comput. Sci. Rev."},{"issue":"2","key":"10.1016\/j.hcc.2025.100316_b4","doi-asserted-by":"crossref","first-page":"26","DOI":"10.3390\/ijfs7020026","article-title":"Stock market analysis: A review and taxonomy of prediction techniques","volume":"7","author":"Shah","year":"2019","journal-title":"Int. J. Financ. Stud."},{"key":"10.1016\/j.hcc.2025.100316_b5","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2020.106181","article-title":"Financial time series forecasting with deep learning: A systematic literature review: 2005\u20132019","volume":"90","author":"Sezer","year":"2020","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.hcc.2025.100316_b6","doi-asserted-by":"crossref","unstructured":"S. Duan, H. Zhang, X. Sui, B. Huang, C. Mu, G. Di, X. Wang, Dashing and Star: Byzantine fault tolerance with weak certificates, in: Proceedings of the Nineteenth European Conference on Computer Systems, 2024, pp. 250\u2013264.","DOI":"10.1145\/3627703.3650073"},{"issue":"10","key":"10.1016\/j.hcc.2025.100316_b7","doi-asserted-by":"crossref","first-page":"nwac132","DOI":"10.1093\/nsr\/nwac132","article-title":"Recent progress on BFT in the era of blockchains","volume":"9","author":"Duan","year":"2022","journal-title":"Natl. Sci. Rev."},{"issue":"10s","key":"10.1016\/j.hcc.2025.100316_b8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3503042","article-title":"Bft in blockchains: From protocols to use cases","volume":"54","author":"Wang","year":"2022","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"10.1016\/j.hcc.2025.100316_b9","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/MSEC.2019.2893730","article-title":"On the origins and variations of blockchain technologies","volume":"17","author":"Sherman","year":"2019","journal-title":"IEEE Secur. Priv."},{"key":"10.1016\/j.hcc.2025.100316_b10","series-title":"2018 Second International Conference on Electronics, Communication and Aerospace Technology","first-page":"1795","article-title":"Feature extraction by using deep learning: A survey","author":"Dara","year":"2018"},{"key":"10.1016\/j.hcc.2025.100316_b11","doi-asserted-by":"crossref","DOI":"10.1016\/j.jksuci.2024.102068","article-title":"RNN-LSTM: From applications to modeling techniques and beyond\u2014Systematic review","author":"Al-Selwi","year":"2024","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"issue":"2","key":"10.1016\/j.hcc.2025.100316_b12","doi-asserted-by":"crossref","first-page":"654","DOI":"10.1016\/j.ejor.2017.11.054","article-title":"Deep learning with long short-term memory networks for financial market predictions","volume":"270","author":"Fischer","year":"2018","journal-title":"European J. Oper. Res."},{"key":"10.1016\/j.hcc.2025.100316_b13","article-title":"Predicting stock market index using LSTM","volume":"9","author":"Bhandari","year":"2022","journal-title":"Mach. Learn. Appl."},{"issue":"24","key":"10.1016\/j.hcc.2025.100316_b14","doi-asserted-by":"crossref","first-page":"9603","DOI":"10.1016\/j.eswa.2015.07.052","article-title":"Sentiment analysis on social media for stock movement prediction","volume":"42","author":"Nguyen","year":"2015","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.hcc.2025.100316_b15","series-title":"Blockchain and artificial intelligence (AI) integration for revolutionizing security and transparency in finance","author":"Rane","year":"2023"},{"key":"10.1016\/j.hcc.2025.100316_b16","series-title":"Research Handbook on Digital Transformations","first-page":"225","article-title":"Blockchain technology: principles and applications","author":"Pilkington","year":"2016"},{"key":"10.1016\/j.hcc.2025.100316_b17","series-title":"ICDCS","first-page":"1337","article-title":"Towards dependable, scalable, and pervasive distributed ledgers with blockchains","author":"Zhang","year":"2018"},{"key":"10.1016\/j.hcc.2025.100316_b18","article-title":"Trusted access control mechanism for data with blockchain-assisted attribute encryption","author":"Liu","year":"2024","journal-title":"High Confid. Comput."},{"key":"10.1016\/j.hcc.2025.100316_b19","article-title":"Demystifying blockchain: A critical analysis of challenges, applications and opportunities","volume":"54","author":"Upadhyay","year":"2020","journal-title":"Int. J. Inf. Manage."},{"key":"10.1016\/j.hcc.2025.100316_b20","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2024.100233","article-title":"Review of data security within energy blockchain: A comprehensive analysis of storage, management, and utilization","author":"He","year":"2024","journal-title":"High Confid. Comput."},{"issue":"1","key":"10.1016\/j.hcc.2025.100316_b21","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.bushor.2018.08.012","article-title":"Blockchain technology for enhancing supply chain resilience","volume":"62","author":"Min","year":"2019","journal-title":"Bus. Horiz."},{"issue":"2","key":"10.1016\/j.hcc.2025.100316_b22","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2021.100048","article-title":"A survey on blockchain systems: Attacks, defenses, and privacy preservation","volume":"2","author":"Chen","year":"2022","journal-title":"High Confid. Comput."},{"issue":"1","key":"10.1016\/j.hcc.2025.100316_b23","doi-asserted-by":"crossref","DOI":"10.1561\/116.00000123","article-title":"Recurrent neural networks and their memory behavior: A survey","volume":"11","author":"Su","year":"2022","journal-title":"APSIPA Trans. Signal Inf. Process."},{"issue":"9","key":"10.1016\/j.hcc.2025.100316_b24","doi-asserted-by":"crossref","first-page":"517","DOI":"10.3390\/info15090517","article-title":"Recurrent neural networks: A comprehensive review of architectures, variants, and applications","volume":"15","author":"Mienye","year":"2024","journal-title":"Information"},{"key":"10.1016\/j.hcc.2025.100316_b25","series-title":"Forecasting economics and financial time series: ARIMA vs. LSTM","author":"Siami-Namini","year":"2018"},{"key":"10.1016\/j.hcc.2025.100316_b26","series-title":"2020 Sixth International Conference on Parallel, Distributed and Grid Computing","first-page":"211","article-title":"Stock price prediction using LSTM and SVR","author":"Bathla","year":"2020"},{"key":"10.1016\/j.hcc.2025.100316_b27","doi-asserted-by":"crossref","unstructured":"W. Buachuen, P. Kantavat, Automated Stock Trading System using Technical Analysis and Deep Learning Models, in: Proceedings of the 13th International Conference on Advances in Information Technology, 2023, pp. 1\u20139.","DOI":"10.1145\/3628454.3631670"},{"issue":"3","key":"10.1016\/j.hcc.2025.100316_b28","doi-asserted-by":"crossref","first-page":"1751","DOI":"10.1007\/s00530-021-00758-w","article-title":"A graph-based CNN-LSTM stock price prediction algorithm with leading indicators","volume":"29","author":"Wu","year":"2023","journal-title":"Multimedia Syst."},{"issue":"9","key":"10.1016\/j.hcc.2025.100316_b29","doi-asserted-by":"crossref","first-page":"11768","DOI":"10.1007\/s11227-022-04326-5","article-title":"Stock price prediction based on LSTM and LightGBM hybrid model","volume":"78","author":"Tian","year":"2022","journal-title":"J. Supercomput."},{"key":"10.1016\/j.hcc.2025.100316_b30","doi-asserted-by":"crossref","first-page":"9066","DOI":"10.1109\/ACCESS.2020.3047109","article-title":"Stock prediction based on genetic algorithm feature selection and long short-term memory neural network","volume":"9","author":"Chen","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.hcc.2025.100316_b31","doi-asserted-by":"crossref","first-page":"9713","DOI":"10.1007\/s00521-019-04504-2","article-title":"Stock closing price prediction based on sentiment analysis and LSTM","volume":"32","author":"Jin","year":"2020","journal-title":"Neural Comput. Appl."},{"issue":"1","key":"10.1016\/j.hcc.2025.100316_b32","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1108\/IJCS-05-2020-0012","article-title":"A stock price prediction method based on deep learning technology","volume":"5","author":"Ji","year":"2021","journal-title":"Int. J. Crowd Sci."},{"key":"10.1016\/j.hcc.2025.100316_b33","series-title":"2018 27th International Conference on Computer Communication and Networks","first-page":"1","article-title":"A survey of blockchain: Techniques, applications, and challenges","author":"Gao","year":"2018"},{"key":"10.1016\/j.hcc.2025.100316_b34","doi-asserted-by":"crossref","DOI":"10.7717\/peerj-cs.1705","article-title":"Blockchain technology and application: an overview","volume":"9","author":"Dong","year":"2023","journal-title":"PeerJ Comput. Sci."},{"issue":"1","key":"10.1016\/j.hcc.2025.100316_b35","doi-asserted-by":"crossref","first-page":"181","DOI":"10.18576\/jsap\/120117","article-title":"Impact of blockchain on financial technology innovation in the banking, financial services and insurance (BFSI) sector","volume":"12","author":"Khatwani","year":"2023","journal-title":"J. Stat. Appl. Probab."},{"issue":"3","key":"10.1016\/j.hcc.2025.100316_b36","first-page":"254","article-title":"Distributed ledger technology, blockchain and insurance: Opportunities, risks and challenges","volume":"29","author":"Tarr","year":"2018","journal-title":"Insur. Law J."},{"issue":"2","key":"10.1016\/j.hcc.2025.100316_b37","doi-asserted-by":"crossref","first-page":"20","DOI":"10.3390\/fi10020020","article-title":"Blockchain and smart contracts for insurance: Is the technology mature enough?","volume":"10","author":"Gatteschi","year":"2018","journal-title":"Futur. Internet"},{"key":"10.1016\/j.hcc.2025.100316_b38","doi-asserted-by":"crossref","unstructured":"O. Bhadra, S. Sahoo, C.M. Kumar, R. Halder, Decentralized Insurance Subrogation Using Blockchain, in: Proceedings of the 2022 5th International Conference on Blockchain Technology and Applications, 2022, pp. 1\u20139.","DOI":"10.1145\/3581971.3581972"},{"issue":"8","key":"10.1016\/j.hcc.2025.100316_b39","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s10916-018-0996-4","article-title":"MIStore: a blockchain-based medical insurance storage system","volume":"42","author":"Zhou","year":"2018","journal-title":"J. Med. Syst."},{"key":"10.1016\/j.hcc.2025.100316_b40","series-title":"2018 IEEE International Conference on Cloud Engineering","first-page":"378","article-title":"Blockcis\u2014a blockchain-based cyber insurance system","author":"Lepoint","year":"2018"},{"issue":"11","key":"10.1016\/j.hcc.2025.100316_b41","doi-asserted-by":"crossref","first-page":"1343","DOI":"10.3390\/electronics10111343","article-title":"Ciosy: A collaborative blockchain-based insurance system","volume":"10","author":"Loukil","year":"2021","journal-title":"Electronics"},{"key":"10.1016\/j.hcc.2025.100316_b42","series-title":"How smart contracts can change the insurance industry: Benefits and challenges of using blockchain technology","author":"Kantur","year":"2018"},{"issue":"01","key":"10.1016\/j.hcc.2025.100316_b43","first-page":"035","article-title":"Harnessing blockchain technology in banking to enhance financial inclusion, security, and transaction efficiency","volume":"August 5","author":"Sanyaolu","year":"2024","journal-title":"Int. J. Sch. Res. Sci. Technol."},{"key":"10.1016\/j.hcc.2025.100316_b44","doi-asserted-by":"crossref","first-page":"14","DOI":"10.3389\/fbloc.2019.00014","article-title":"Blockchain technologies and remittances: From financial inclusion to correspondent banking","volume":"2","author":"Rella","year":"2019","journal-title":"Front. Blockchain"},{"issue":"4","key":"10.1016\/j.hcc.2025.100316_b45","doi-asserted-by":"crossref","first-page":"170","DOI":"10.3390\/jrfm14040170","article-title":"Fantastic beasts: blockchain based banking","volume":"14","author":"Jayasuriya\u00a0Daluwathumullagamage","year":"2021","journal-title":"J. Risk Financ. Manag."},{"key":"10.1016\/j.hcc.2025.100316_b46","doi-asserted-by":"crossref","unstructured":"M. Mamun, B. Arifuzzaman, S.N. Mahmud, Banking Management System Architecture Using AI & Blockchain, in: Proceedings of the 2nd International Conference on Computing Advancements, 2022, pp. 75\u201382.","DOI":"10.1145\/3542954.3542966"},{"key":"10.1016\/j.hcc.2025.100316_b47","doi-asserted-by":"crossref","unstructured":"Z. Xu, Q. Wang, Z. Wang, D. Liu, Y. Xiang, S. Wen, PPM: a provenance-provided data sharing model for open banking via blockchain, in: Proceedings of the Australasian Computer Science Week Multiconference, 2020, pp. 1\u20138.","DOI":"10.1145\/3373017.3373022"},{"issue":"1\/2","key":"10.1016\/j.hcc.2025.100316_b48","doi-asserted-by":"crossref","first-page":"1","DOI":"10.22215\/timreview\/1481","article-title":"The impact of fintech and blockchain technologies on banking and financial services","volume":"12","author":"Kumari","year":"2022","journal-title":"Technol. Innov. Manag. Rev."},{"issue":"3","key":"10.1016\/j.hcc.2025.100316_b49","article-title":"A review of blockchain technology applications for financial services","volume":"2","author":"Javaid","year":"2022","journal-title":"BenchCouncil Trans. Benchmarks Stand. Eval."},{"key":"10.1016\/j.hcc.2025.100316_b50","series-title":"2018 International Conference on Circuits and Systems in Digital Enterprise Technology","first-page":"1","article-title":"Deep learning for financial prediction","author":"Unadkat","year":"2018"},{"key":"10.1016\/j.hcc.2025.100316_b51","doi-asserted-by":"crossref","unstructured":"C. Hutto, E. Gilbert, Vader: A parsimonious rule-based model for sentiment analysis of social media text, in: Proceedings of the International AAAI Conference on Web and Social Media, vol. 8, no. 1, 2014, pp. 216\u2013225.","DOI":"10.1609\/icwsm.v8i1.14550"},{"key":"10.1016\/j.hcc.2025.100316_b52","article-title":"A comparative assessment of sentiment analysis and star ratings for consumer reviews","volume":"54","author":"Al-Natour","year":"2020","journal-title":"Int. J. Inf. Manage."},{"key":"10.1016\/j.hcc.2025.100316_b53","series-title":"OsDI, vol. 99, no. 1999","first-page":"173","article-title":"Practical byzantine fault tolerance","author":"Castro","year":"1999"},{"key":"10.1016\/j.hcc.2025.100316_b54","series-title":"Introduction to Public Key Infrastructures","author":"Buchmann","year":"2013"},{"key":"10.1016\/j.hcc.2025.100316_b55","series-title":"SSL and TLS: Theory and Practice","author":"Oppliger","year":"2023"}],"container-title":["High-Confidence Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295225000200?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295225000200?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T13:45:47Z","timestamp":1766497547000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2667295225000200"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":55,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["S2667295225000200"],"URL":"https:\/\/doi.org\/10.1016\/j.hcc.2025.100316","relation":{},"ISSN":["2667-2952"],"issn-type":[{"value":"2667-2952","type":"print"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"LSTM stock prediction model based on blockchain","name":"articletitle","label":"Article Title"},{"value":"High-Confidence Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.hcc.2025.100316","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 The Author(s). Published by Elsevier B.V. on behalf of Shandong University.","name":"copyright","label":"Copyright"}],"article-number":"100316"}}