{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T05:23:08Z","timestamp":1725600188653},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T00:00:00Z","timestamp":1657670400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T00:00:00Z","timestamp":1657670400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,13]]},"DOI":"10.1109\/cits55221.2022.9832998","type":"proceedings-article","created":{"date-parts":[[2022,7,21]],"date-time":"2022-07-21T19:37:12Z","timestamp":1658432232000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["A Comprehensive Study on Artificial Intelligence and Blockchain Driven Beyond 5G Networks"],"prefix":"10.1109","author":[{"given":"Nitin","family":"Gupta","sequence":"first","affiliation":[{"name":"National Institute of Technology,Department of Computer Science and Engineering,Hamirpur,HP,India"}]},{"given":"Mohammad S.","family":"Obaidat","sequence":"additional","affiliation":[{"name":"University of Texas-Permian Basin,Department of Computer Science and Director of Cybersecurity Center,Odessa,TX,USA,79762"}]},{"given":"Deborsi","family":"Basu","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Kharagpur,G.S. Sanyal School of Telecommunications,India"}]},{"given":"Uttam","family":"Ghosh","sequence":"additional","affiliation":[{"name":"Meharry Medical College,Department of Computer Science and Data Science,Nashville,TN,USA"}]},{"given":"Kuie-Fang","family":"Hsiao","sequence":"additional","affiliation":[{"name":"University of Sharjah,Information Systems Department,UAE"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2019.8928099"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1201\/9780367276706-4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3046565"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2973651"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2973705"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2875542"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013824"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900179"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cam.2020.112991"},{"key":"ref19","article-title":"Blockchain as a service for multi-access edge computing: A deep reinforcement learning approach","author":"nguyen","year":"2019","journal-title":"arXiv preprint arXiv 2001 04060"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800376"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CITS52676.2021.9618005"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3439725"},{"key":"ref5","first-page":"29","article-title":"Design of a blockchain enabled secure vehicle-to-vehicle communication system","author":"debashis","year":"2021","journal-title":"2021 4th International Conference on Signal Processing and Information Security (ICSPIS)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3100103"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CITS52676.2021.9618277"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2964673"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2020.3040541"},{"journal-title":"Blockchain meets ai for resilient and intelligent internet of vehicles","year":"2021","author":"singh","key":"ref9"},{"key":"ref20","article-title":"Bayesian reinforcement learning and bayesian deep learning for blockchains with mobile edge computing","author":"asheralieva","year":"2020","journal-title":"IEEE Transactions on Cognitive Communications and Networking early access"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2709784"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2942190"},{"key":"ref24","article-title":"Modelchain: Decentralized privacy-preserving healthcare predictive modeling framework on private blockchain networks","author":"kuo","year":"2018","journal-title":"arXiv preprint arXiv 1802 01808"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2786307"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107431"}],"event":{"name":"2022 International Conference on Computer, Information and Telecommunication Systems (CITS)","start":{"date-parts":[[2022,7,13]]},"location":"Piraeus, Greece","end":{"date-parts":[[2022,7,15]]}},"container-title":["2022 International Conference on Computer, Information and Telecommunication Systems (CITS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9832908\/9832911\/09832998.pdf?arnumber=9832998","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T19:59:27Z","timestamp":1659988767000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9832998\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,13]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/cits55221.2022.9832998","relation":{},"subject":[],"published":{"date-parts":[[2022,7,13]]}}}