{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T17:31:59Z","timestamp":1769016719431,"version":"3.49.0"},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T00:00:00Z","timestamp":1662336000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T00:00:00Z","timestamp":1662336000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100009226","name":"National Security Agency","doi-asserted-by":"publisher","award":["H98230-20-1-0329,H98230-20-1-0403,H98230-20-1-0414,H98230-21-1-0262"],"award-info":[{"award-number":["H98230-20-1-0329,H98230-20-1-0403,H98230-20-1-0414,H98230-21-1-0262"]}],"id":[{"id":"10.13039\/100009226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,5]]},"DOI":"10.1109\/bcca55292.2022.9922027","type":"proceedings-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T01:25:48Z","timestamp":1667525148000},"page":"237-244","source":"Crossref","is-referenced-by-count":38,"title":["Trusted AI with Blockchain to Empower Metaverse"],"prefix":"10.1109","author":[{"given":"Syed","family":"Badruddoja","sequence":"first","affiliation":[{"name":"University of North Texas,Dept. of Computer Science &#x0026; Engineering,Denton,TX,USA,76207"}]},{"given":"Ram","family":"Dantu","sequence":"additional","affiliation":[{"name":"University of North Texas,Dept. of Computer Science &#x0026; Engineering,Denton,TX,USA,76207"}]},{"given":"Yanyan","family":"He","sequence":"additional","affiliation":[{"name":"University of North Texas,Dept. of Computer Science &#x0026; Engineering,Denton,TX,USA,76207"}]},{"given":"Mark","family":"Thompson","sequence":"additional","affiliation":[{"name":"University of North Texas,Dept. of Computer Science &#x0026; Engineering,Denton,TX,USA,76207"}]},{"given":"Abiola","family":"Salau","sequence":"additional","affiliation":[{"name":"University of North Texas,Dept. of Computer Science &#x0026; Engineering,Denton,TX,USA,76207"}]},{"given":"Kritagya","family":"Upadhyay","sequence":"additional","affiliation":[{"name":"University of North Texas,Dept. of Computer Science &#x0026; Engineering,Denton,TX,USA,76207"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3202047"},{"key":"ref2","article-title":"Blockchain for the Metaverse: A Review","author":"Gadekallu","year":"2022","journal-title":"arXiv preprint"},{"key":"ref3","article-title":"Artificial Intelligence for the Metaverse: A Survey","author":"Pham","year":"2022","journal-title":"arXiv e-prints"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2902501"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2018.8343163"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/jsfa.9912"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91668-2_2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1186\/s12916-019-1296-7"},{"key":"ref9","volume-title":"Understanding the digital economy: data, tools, and research","author":"Brynjolfsson","year":"2002"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.strueco.2004.02.001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2890507"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.3620971"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/396\/1\/012030"},{"key":"ref14","article-title":"Skadden, Arps, Slate, Meagher Flom LLP","volume-title":"An introduction to Smart Contracts and their Potential and Inherent Limitations","author":"Levi","year":"2021"},{"key":"ref15","volume-title":"Solidity Programming guide","year":"2021"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4249\/scholarpedia.1883"},{"issue":"22","key":"ref17","first-page":"41","article-title":"An empirical study of the naive Bayes classifier","volume-title":"IJCAI 2001 workshop on empirical methods in artificial intelligence","volume":"3","author":"Rish"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/21.97458"},{"key":"ref19","volume-title":"Is your ML model Secure","author":"Bantis","year":"2021"},{"key":"ref20","article-title":"Towards Trustworthy Ai development\u201d mechanisms for supporting verifiable claims","author":"Brundage","year":"2020"},{"issue":"2019","key":"ref21","first-page":"100199","volume":"34","author":"Pitropakis","journal-title":"A Taxonomy and Survey of attacks against machine learning","ISSN":"https:\/\/id.crossref.org\/issn\/1574-0137","issn-type":"print"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3445016"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3332281"},{"issue":"1","key":"ref24","first-page":"137","article-title":"Explainable AI","volume-title":"Explainable AI: From black box to glass box. Journal of the Academy of Marketing Science","volume":"48","author":"Rai","year":"2020"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2022.3188249"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.99114"},{"key":"ref27","article-title":"The future of human-Al collaboration: a taxonomy of design knowledge for hybrid intelligence systems","author":"Dellermann","year":"2021","journal-title":"arXiv preprint"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51057-2_34"},{"key":"ref29","article-title":"Ipfs-content addressed, versioned, p2p file system","author":"Benet","year":"2014","journal-title":"arXiv preprint"},{"key":"ref30","volume-title":"Comparative Study on Classic Machine Learning Algorithms","author":"Varghese","year":"2022"},{"key":"ref31","volume-title":"Simple Neural Network on MNIST Handwritten Digit Dataset","author":"Ardi","year":"2022"},{"key":"ref32","volume-title":"Multiple Linear Regression from Scratch using Python","author":"Neto","year":"2021"},{"key":"ref33","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"Pedregosa","year":"2011","journal-title":"the Journal of machine Learning research"},{"key":"ref34","first-page":"22","article-title":"Ethereum white paper","volume":"1","author":"Buterin","year":"2013","journal-title":"GitHub repository"},{"key":"ref35","volume-title":"Ethereum whitepaper","year":"2022"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TPSISA52974.2021.00032"},{"key":"ref37","volume-title":"Scaling Public Blockchains. A comprehensive analysis of optimistic and zero-knowledge roll-ups","author":"Schaffner","year":"2021"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102471"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355457"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC51069.2021.9461148"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW50202.2020.00156"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain50366.2020.00041"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TPSISA52974.2021.00011"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TPSISA52974.2021.00029"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TPSISA52974.2021.00015"},{"key":"ref46","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-18679-0_14","article-title":"Multi-Tier Reputation for Data Cooperatives","volume-title":"The 3rd International Conference on Mathematical Research for Blockchain Economy","author":"Salau"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.5220\/0011328700003283"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC51069.2021.9461056"}],"event":{"name":"2022 Fourth International Conference on Blockchain Computing and Applications (BCCA)","location":"San Antonio, TX, USA","start":{"date-parts":[[2022,9,5]]},"end":{"date-parts":[[2022,9,7]]}},"container-title":["2022 Fourth International Conference on Blockchain Computing and Applications (BCCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9921414\/9921754\/09922027.pdf?arnumber=9922027","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T06:26:19Z","timestamp":1706077579000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9922027\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,5]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/bcca55292.2022.9922027","relation":{},"subject":[],"published":{"date-parts":[[2022,9,5]]}}}